A breach affecting Manage My Health could have exposed sensitive data for up to 120,000 New Zealand patients – Read More –
Category: Privacy/Governance Feed
A breach affecting Manage My Health could have exposed sensitive data for up to 120,000 New Zealand patients – Read More –
A high-severity security flaw in Open WebUI Direct Connections risks account takeover and server compromises – Read More –
Multi-stage malware campaign targets hospitality organizations using social engineering and abuse of MSBuild.exe – Read More –
UK government’s new Cyber Action plan looks to provide more ‘hands-on’ support for protecting against and responding to security incidents – Read More –
JLR’s wholesale sales plunged 43% and retail drops 25% in the third quarter of 2025 following the 2025 cyber-attack – Read More –
Privacy-Enhancing Technologies: The New Foundation of Enterprise Data Protection – JISA Softech Pvt Ltd
Over the years, the concept of enterprise data protection strategies has been based on a known trio perimeter security, access controls,… The post Privacy-Enhancing Technologies: The New Foundation of Enterprise Data Protection appeared first on JISA Softech Pvt Ltd. – Read More – JISA Softech Pvt Ltd
Ilya Lichtenstein, convicted for the 2016 Bitfinex hack, has been released early from prison to home confinement – Read More –
A new Python-based malware called VVS stealer has been identified, targeting Discord users with stealthy techniques to steal data – Read More –
The European Space Agency has said that external servers were recently involved in a security “issue” – Read More –
TRM Labs says it has recorded $35m drained from users’ wallets following 2022 LastPass breach – Read More –
For most startups and small-to-medium enterprises (SMEs), the Digital Personal Data Protection (DPDP) Act feels like a high-stakes puzzle:… The post Budget friendly DPDP Compliance for Startups & SMEs appeared first on JISA Softech Pvt Ltd. – Read More – JISA Softech Pvt Ltd
Explore Infosecurity Magazine’s most-read cybersecurity stories of 2025, from major vendor shake-ups and zero-day exploits to AI-driven threats and supply chain attacks – Read More –
The global cryptographic space is changing in a way that has not happened for many years. Quantum computing is… The post Post-Quantum Security: How GCC Governments Are Planning the Shift appeared first on JISA Softech Pvt Ltd. – Read More – JISA Softech Pvt Ltd
In an era defined by the exponential expansion of digital footprints, organisations are under unprecedented pressure to demonstrate disciplined… The post Data Retention & Automatic Erasure: How to Build a Compliant Workflow appeared first on JISA Softech Pvt Ltd. – Read More – JISA Softech Pvt Ltd
In an era defined by the exponential expansion of digital footprints, organisations are under unprecedented pressure to demonstrate disciplined… The post Data Retention & Automatic Erasure: How to Build a Compliant Workflow appeared first on JISA Softech Pvt Ltd. – Read More – JISA Softech Pvt Ltd
The SEC has charged several crypto platforms and investment clubs for defrauding US investors of more than $14m – Read More –
A coordinated wave of fake online job ads targeting the Middle East and North Africa has been uncovered, exploiting remote work trends – Read More –
NIST and MITRE are collaboratively launching two centers to advance AI security for US manufacturing and critical infrastructure – Read More –
French postal service warns of “major network incident” just before Christmas – Read More –
ServiceNow is set to acquire Armis for $7.75bn in a cash-only deal expected to close in the second half of 2026 – Read More –
The global acceleration of privacy regulation DPDP Act, GDPR, DIFC DP Law, PDPL (UAE), and evolving sectoral mandates has… The post Step-by-Step Guide to Implementing 72-Hour Breach Reporting appeared first on JISA Softech Pvt Ltd. – Read More – JISA Softech Pvt Ltd
A newly discovered macOS malware mimics legitimate apps code-signed and notarized by Apple – Read More –
A University of Phoenix data breach affecting nearly 3.5 million individuals has been claimed by the Clop ransomware collective – Read More –
Infosecurity has selected some of the key ransomware statistics for 2025 – Read More –
The Middle East and Africa region is moving through a fast digital shift. This shift covers national identity programs,… The post AI-Powered Attacks in MEA: Deepfakes, Automation & New Threat Vectors appeared first on JISA Softech Pvt Ltd. – Read More – JISA Softech Pvt Ltd
Nissan has revealed that over 20,000 customers have had personal information compromised in a third-party data breach – Read More –
Operational Sentinel helps to crack down on cybercrime across 19 African countries in a month-long campaign – Read More –
NordVPN has warned that malicious postal service websites have surged by 86% over the past month, targeting holiday delivery tracking – Read More –
Open-source server monitoring tool, Nezha, is being exploited by attackers for remote system control – Read More –
DXS International, an official partner of NHS England, said the breach has not affected its operations – Read More –
Fortra has uncovered a prolific BEC group dubbed “Scripted Sparrow” spanning three continents and at least five countries – Read More –
A Ukrainian man has pleaded guilty to charges connecting him to Nefilim ransomware attacks – Read More –
The Digital Personal Data Protection Act (DPDP Act) of India has plunged the organisations into a new sphere of… The post How to Build a DPDP-Ready Data Inventory in 30 Days appeared first on JISA Softech Pvt Ltd. – Read More – JISA Softech Pvt Ltd
The Danish intelligence service believes some pro-Russian hacktivist groups have links with the Kremlin – Read More –
The US has charged 54 individuals in a massive ATM jackpotting conspiracy linked to Venezuelan crime syndicate Tren de Aragua, accused of stealing millions – Read More –
A 39-year-old Russian national is accused of working with cybercriminals to convert criminal proceeds from cryptocurrency into various cash currencies – Read More –
A surge in phishing attacks exploiting Microsoft’s OAuth device code flow has been identified by Proofpoint – Read More –
Chainalysis warns North Korea continues to steal billions in crypto for its weapons program – Read More –
A new variant of the BeaverTail malware linked to North Korean hackers has been identified targeting cryptocurrency traders and developers – Read More –
The UK’s tax office has received 135,500 reports of suspected scams in the past 10 months including 4800 related to self assessment filings – Read More –
A critical flaw in the Motors WordPress theme affecting more than 20,000 installations allows low-privileged users to gain full control of websites – Read More –
A novel attack technique dubbed ”Lies-in-the-Loop” (LITL) has been observed manipulating human approval prompts in agentic AI systems – Read More –
ISACA has been appointed by the US DoD as the global credentialing authority for its CMMC program – Read More –
LKQ confirmed that over 9000 individuals saw their personal data compromised because of the breach – Read More –
Eurojust reveals new policing operation which helped to smash a Ukraine-based call center fraud gang – Read More –
China’s Ink Dragon is using European government networks to hide its espionage activity – Read More –
Continuous Monitoring for Cloud Protection: Best Practices for Saudi Compliance – JISA Softech Pvt Ltd
The process of cloud adoption in Saudi Arabia is on a fast track as the nation is following the… The post Continuous Monitoring for Cloud Protection: Best Practices for Saudi Compliance appeared first on JISA Softech Pvt Ltd. – Read More – JISA Softech Pvt Ltd
The browser extension Urban VPN Proxy has been reportedly collecting users’ AI chat conversations – Read More –
A flaw in JumpCloud Remote Assist for Windows has exposed managed endpoints to local privilege escalation and denial-of-service attacks – Read More –