The security researchers from Zscaler ThreatLabz have also discovered five new tools deployed by the North Korean hacking group – Read More –
Category: Privacy/Governance Feed
The UK government says its new Vulnerability Monitoring Service has cut unresolved security flaws by 75% and reduced cyber-attack fix times from nearly two months to just over a week – Read More –
International law enforcement operation led by Europol targets network of teenagers and young adults involved in ransomware attacks, extortion and other crimes – Read More –
New botnet Aeternum shifted C2 operations to Polygon blockchain, complicating takedown efforts – Read More –
2025 saw 32M phishing emails, with identity threats surpassing vulnerabilities – Read More –
The UK’s Information Commissioner’s Office is about to ditch single-leader model for CEO and board in a major shake-up – Read More –
Datadog report reveals two-fifths of services are affected by exploitable bugs – Read More –
UNC2814 hit 53 victims in 42 countries with novel backdoor in decade long cyber espionage operation – Read More –
The US and allies are urging Cisco Catalyst SD-WAN customers to hunt for signs of exploitation – Read More –
From Policy to Practice: How Indian Companies Can Audit Their DPDP Compliance Annually – JISA Softech Pvt Ltd
The Digital Personal Data Protection Act, 2023 (DPDP Act) in India has transformed the compliant dialogue into a policy-making enterprise to… The post From Policy to Practice: How Indian Companies Can Audit Their DPDP Compliance Annually appeared first on JISA Softech Pvt Ltd. – Read More – JISA Softech Pvt Ltd
IBM’s 2026 X-Force report reveals 44% rise in cyber-attacks on public apps, driven by AI and flaws – Read More –
Malicious NuGet package mimicking Stripe’s library targeted developers – Read More –
A former general manager of a US defense contractor has been sentenced after selling zero days to Russia – Read More –
The UK’s ICO has fined Reddit over £14m for failing to use children’s personal information lawfully – Read More –
DTEX claims insider incidents cost $19.5m in 2025, with employee negligence most expensive – Read More –
Phishing attack mimicking Bitpanda targets users, harvesting credentials and personal information – Read More –
Ransomware Medusa linked to North Korean hackers targets US healthcare amid ongoing attacks – Read More –
ReliaQuest claims AI has reduced breakout and exfiltration time to under 10 minutes – Read More –
Anthropic accused DeepSeek, Moonshot and MiniMax of illicitly using Claude to steal some of the AI model’s capabilities – Read More –
CrowdStrike Global Threat Report warns how adversaries are leveraging AI to make campaigns more efficient and more effective – Read More –
DPDP Act for SaaS and Startups: How to Scale Privacy-by-Design Without Slowing Product – JISA Softech Pvt Ltd
The Digital Personal Data Protection (DPDP) Act in India has fundamentally altered the way that SaaS firms and startups… The post DPDP Act for SaaS and Startups: How to Scale Privacy-by-Design Without Slowing Product appeared first on JISA Softech Pvt Ltd. – Read More – JISA Softech Pvt Ltd
Sophisticated Python malware uncovered in fraud probe shows obfuscation, disposable infrastructure – Read More –
Supply chain worm mimicking Shai-Hulud malware spread via malicious npm packages, targeting AI tools has been identified by security researchers – Read More –
A low-skilled Russian-speaking attacker has used GenAI tools to help deploy a successful attack workflow targeting FortiGate instances – Read More –
Advantest, a Japanese specialist in testing computer chips for major semiconductor manufacturers, has deployed incident response protocols following a cybersecurity incident – Read More –
A new FBI Flash alert claims $20m was lost to ATM jackpotting attacks in 2025 alone – Read More –
University of Mississippi Medical Center is still scrambling to respond to a ransomware attack last Thursday – Read More –
DDoS attack frequency has risen to ‘alarming levels,’ warns Radware report – Read More –
A new Android malware implant using Google Gemini to perform persistence tasks was discovered on VirusTotal and analyzed by ESET – Read More –
New Remcos RAT variant enhances real-time surveillance and evasion techniques to compromise Windows – Read More –
Fraud campaign exploiting Indonesia’s Coretax resulted in $1.5m to $2m in losses via malicious apps – Read More –
Forescout paper reveals ICS advisories hit a record 508 in 2025 – Read More –
A new cybercriminal toolkit uses proxies to mimic popular online services and represents a “significant escalation in phishing infrastructure,” warn researchers at Abnormal – Read More –
Four serious new vulnerabilities affect Microsoft Visual Studio Code, Cursor and Windsurf extensions, three of which remain unpatched – Read More –
Endor Labs has published details of six new vulnerabilities in popular AI assistant OpenClaw – Read More –
Since the Digital Personal Data Protection (DPDP) regime in India is already shifting towards enforcement and not interpretation, organizations are coming… The post Choosing and Implementing a DPDP Tech Stack: Consent, Logs, and Governance appeared first on JISA Softech Pvt Ltd. – Read More – JISA Softech Pvt Ltd
Cryptojacking campaign used pirated software to deploy a persistent XMRig miner with stealth tactics – Read More –
AIs like Grok and Microsoft Copilot can be exploited as covert C2 channels for malware communication – Read More –
Searchlight Cyber reports a 30% annual increase in ransomware victim numbers in 2025 – Read More –
Mandiant reveals campaign featuring exploit of a CVSS 10.0 CVE in Dell RecoverPoint for Virtual Machines – Read More –
Android 17 Beta introduces privacy, security updates and a new Canary channel for improved development – Read More –
iOS 26.4 Beta adds end-to-end encryption for RCS messaging and enhanced Memory Integrity Enforcement – Read More –
Teleport study reveals that organizations running over-privileged AI have a 76% incident rate – Read More –
Unit 42 researchers observed a low-skilled threat actor using an LLM to script a professional extortion strategy, complete with deadlines and pressure tactics – Read More –
Dragos annual report warns of a surge in ransomware attacks causing increased operational disruption in industrial environments – Read More –
Hudson Rock has warned OpenClaw users that infostealers are targeting their configuration files – Read More –
The Digital Personal Data Protection (DPDP) Act is a transformative change in the data protection environment in India, the… The post How to build a DPDP-aligned incident and breach response playbook appeared first on JISA Softech Pvt Ltd. – Read More – JISA Softech Pvt Ltd
NCSC’s Richard Horne has warned that cybercriminals do not care about business size and called for SMEs to act now to secure their organizations – Read More –
Security researchers have challenged end-to-end encryption claims from popular commercial password managers – Read More –
New phishing campaign dubbed Operation DoppelBrand targeted major financial firms like Wells Fargo – Read More –