DNS-based attack in AWS Bedrock AgentCore lets AI sandboxes exfiltrate cloud data – Read More –
Category: Privacy/Governance Feed
The FBI wants to hear from gamers who have downloaded Steam titles containing malware – Read More –
An issue with the Companies House website has put the personal and corporate information of millions at risk – Read More –
A new law enforcement operation against phishing and ransomware operators led to the takedown of 45,000 malicious IP addresses – Read More –
Operation Lightning sees international law enforcement partners shut down ‘SocksEscort,’ a major malicious proxy service used by cybercriminals worldwide – Read More –
The critical vulnerability affecting both cloud and self-hosted n8n instances requires no authentication or even n8n account to be exploited – Read More –
PixRevolution Android trojan hijacks Brazil’s PIX payments in real time using accessibility abuse – Read More –
CISA issued urgent directive as attackers exploit Cisco SD-WAN flaw granting admin access to networks – Read More –
The ICO has fined Police Scotland after it shared the entire contents of a victim’s phone with her alleged attacker – Read More –
The pro-Iran Handala group claims to have wiped 200,000 systems in destructive wiper malware attack on US firm Stryker – Read More –
Since the digital economy of India grows, organizations must process more personal and sensitive data than ever before. The introduction… The post Implementing Key Management Best Practices Under the DPDP Act appeared first on JISA Softech Pvt Ltd. – Read More – JISA Softech Pvt Ltd
French small and medium businesses remained the organizations most targeted by ransomware in 2025 – Read More –
LeakyLooker flaws in Google Looker Studio let attackers run cross-tenant SQL attacks on cloud data – Read More –
Infosecurity Europe 2026 reveals its keynote line-up, featuring Jason Fox, Shlomo Kramer, Cynthia Kaiser and more, with sessions on AI, cloud security and post quantum threats – Read More –
BlackSanta malware targets HR staff with fake resumes, kills EDR and steals system data – Read More –
Over 250 legitimate websites, including news outlets and a US Senate candidate’s official webpage, been compromised to infect visitors with infostealers, warn Rapid7 researchers – Read More –
Palo Alto Networks’ Unit 42 has developed a successful attack to bypass safety guardrails in popular generative AI tools – Read More –
Check Point data shows attack volumes are growing much faster in the UK than worldwide – Read More –
March Patch Tuesday sees Microsoft release updates for 79 flaws – Read More –
OpenAI’s latest acquisition addresses a security need Jamieson O’Reilly, security advisor at OpenClaw, raised during an exclusive interview with Infosecurity – Read More –
Only 24% of organizations test identity disaster recovery plans every 6 months, Quest Software said – Read More –
Ericsson data breach affects 15k employees/customers after third-party service provider compromise – Read More –
Google Cloud report details a sharp rise in attackers exploiting software vulnerabilities, including React2Shell – Read More –
Dutch intelligence reveals Russian state hackers are trying to hijack the Signal and WhatsApp accounts of key targets – Read More –
Prolific ShinyHunters group claims to have stolen data from nearly 400 websites in Experience Cloud attacks – Read More –
The financial ecosystem in India is changing radically. As digital banking, fintech networks, UPI-based applications and API-driven financial services… The post Designing a DPDP-Ready Crypto Architecture for BFSI & Fintech appeared first on JISA Softech Pvt Ltd. – Read More – JISA Softech Pvt Ltd
Huntress researchers uncover campaign exploiting vulnerabilities to steal data using Elastic Cloud as a data hub – Read More –
US national cyber strategy focuses on stronger defenses, countering threats, fostering innovation – Read More –
Over one in five winners of IT-Harvest’s 2026 Cyber 150 are AI security companies – Read More –
New UK Online Crime Centre will combine expertise from a range of sources to takedown online channels cyber-scammers rely on – Read More –
Derrick Van Yeboah admitted he stole over $10m in romance scams as part of crime gang – Read More –
Billing services provider TriZetto Provider Solutions has begun notifying millions of patients about a data breach – Read More –
A bank, an airport, a non-profit and the Israeli branch of a US software company were among the targets of this new MuddyWater campaign – Read More –
Almost a quarter of the zero days detected by Google in 2025 targeted security and networking appliances – Read More –
Malicious insiders are using misusing AI for nefarious gain, while employees cutting corners also creates risk, warns Mimecast – Read More –
Critical flaw “ContextCrush” in Context7 MCP Server could allow malicious instructions into AI tools – Read More –
Exploit kit “Coruna” targets iPhones running iOS 13.0 to 17.2.1, focusing on financial data theft – Read More –
Ox Security warns that Mail2Shell could enable threat actors to hijack FreeScout systems without user interaction – Read More –
A global operation has resulted in the takedown of popular cybercrime forum LeakBase – Read More –
Two of the 48 Cisco vulnerabilities, affecting Secure Firewall Management Center, are maximum-severity flaws – Read More –
Nowadays, information is among the most precious resources of companies and states in the digital age. The cross-border and system-to-system… The post Why India Needs Indigenous HSMs for DPDP Act and RBI Compliance appeared first on JISA Softech Pvt Ltd. – Read More – JISA Softech Pvt Ltd
A coalition of seven Western nations has launched guidelines to help integrate security-by-design principles into future 6G standards – Read More –
Law enforcers and industry partners have taken down notorious phishing-as-a-service platform Tycoon2FA – Read More –
Malware campaign uses Ukrainian email service for credibility, deploying “BadPaw” to execute attacks – Read More –
Increased attempts to compromise surveillance cameras linked to Iran during Middle East conflict – Read More –
The OpenID Foundation warns that fragmented policies on posthumous digital accounts could open the door for fraudsters to exploit AI deepfakes – Read More –
Espionage campaign exploits Israel-Iran conflict, distributing a trojanized Red Alert app via SMS – Read More –
Cloudflare Threat Report warns that AI tools enable attackers who lacked required skills to generate effective attacks rapidly and at scale – Read More –
Seemplicity finds US security leaders work 11 or more extra hours per week – Read More –
Ariomex database reveals potential sanctions evasion and capital transfers tied to Iranian actors – Read More –