PwC’s 29th Global CEO Survey shows cyber risk rising to the top of CEO concerns as confidence in short term business growth weakens – Read More –
Category: Privacy/Governance Feed
Cyber risks for the Milano-Cortina 2026 Winter Games include phishing and spoofed websites as key threat vectors – Read More –
Loan phishing operation in Peru is stealing card info by impersonating financial institutions – Read More –
Sophisticated malware previously thought to be the work of a well-resourced cyber-crime group was built by one person – with the aid of AI tools – Read More –
The EU’s Cybersecurity Act 2.0 will aim to address some of the challenges of the current CSA, including the slow rollout of certification schemes – Read More –
A new service, the Global Cybersecurity Vulnerability Enumeration (GCVE), offers an alternative to the US-led CVE – Read More –
City of London Police has launched the UK’s national Report Fraud service – Read More –
2 security vulnerabilities in the Chainlit framework expose risks from web flaws in AI applications – Read More –
Three vulnerabilities in Anthropic’s Git server for the MCP can be exploited via prompt injection – Read More –
Cybersecurity Researchers at ReliaQuest warn of an ongoing campaign delivered to “high-value individuals” via LinkedIn messages – Read More –
Weaponized AI is fueling a new wave of cybercrime, said Group-IB in its latest report – Read More –
A notorious marketplace for fraud, Tudou Guarantee, appears to have closed its public Telegram groups – Read More –
Gartner predicts 50% of organizations will adopt zero trust data governance by 2028 – Read More –
The digital trust is not a theoretical notion anymore, it is the currency of the contemporary economy. All online transactions, identity checks, signature… The post Why HSMs Are Foundational to Digital Trust appeared first on JISA Softech Pvt Ltd. – Read More – JISA Softech Pvt Ltd
New malware PDFSIDER enables covert, long-term access to compromised systems via advanced techniques – Read More –
UK NCSC warned of disruptive cyber attacks by Russian hacktivists targeting critical infrastructure – Read More –
Users of widely used HR and ERP platforms targeted with malicious extensions which were available in the Chrome Web Store – Read More –
Oleg Evgenievich Nefedov, allegedly one of the founders of Black Basta, was also placed on Europol’s and Interpol’s Most Wanted lists – Read More –
UK firms face confluence of cyber-related risks in 2026, says Nardello & Co – Read More –
CyberArk says it exploited a vulnerability in the StealC infostealer to gather intelligence – Read More –
India’s digital economy is expanding at an unprecedented pace, with AI-driven personalization, digital payments, cloud-native services, and data-driven citizen… The post Data Fiduciary vs. Significant Data Fiduciary: What Changes in 2026 appeared first on JISA Softech Pvt Ltd. – Read More – JISA Softech Pvt Ltd
TamperedChef creates backdoors and steals user credentials – particularly in organizations reliant on technical equipment – Read More –
An eSentire report showed credential theft accounted for 74% of all observed cyber threats in 2025 – Read More –
Check Point Research has reported a surge in attacks on a vulnerability in HPE OneView, driven by the Linux-based RondoDox botnet – Read More –
While ‘traditional’ ransomware attacks remain stable, some gangs are shifting towards exploiting zero-days and supply chains to go straight to stealing data – Read More –
CISA, NCSC and the FBI have released a new security guide to enhance protection for OT environments – Read More –
Hacktivists and cybercriminals have intensified their efforts to exploit vulnerabilities in industrial systems, according to a Cyble report – Read More –
A critical AWS CodeBuild misconfiguration has exposed core repositories to potential attack – Read More –
IANS Research reveals a growth in executive-level CISO titles, amid resource challenges – Read More –
ISACA’s State of Privacy 2026 report reveals that data privacy teams remain understaffed and underfunded, despite growing regulatory demands and rising technical privacy challenges – Read More –
DDoS-ers are striking a website linked to a data breach at the Department of Homeland Security – Read More –
In modern enterprises, data is not a fixed resource that can be assigned to a particular system or department…. The post Understanding the enterprise data lifecycle appeared first on JISA Softech Pvt Ltd. – Read More – JISA Softech Pvt Ltd
RedVDS cyber-crime-as-a-service platform powering phishing, BEC attacks and other fraud has cost victims millions – Read More –
Phishing attacks have been identified using fake PayPal alerts to exploit remote monitoring and management tools – Read More –
A new DeadLock ransomware operation uses Polygon blockchain smart contracts to manage proxy server addresses – Read More –
The financial sector should finalize its post-quantum cryptography transition circa 2034, G7 cyber experts said – Read More –
Chainalysis estimates $17bn will be lost to crypto scams in 2025 as AI takes hold – Read More –
Microsoft has patched three zero-day vulnerabilities in the first patch Tuesday of 2026, including one under active exploitation – Read More –
SHADOW#REACTOR is a multi-stage Windows malware campaign that stealthily deploys the Remcos RAT using complex infection techniques – Read More –
A high-severity security flaw in the Gogs Git service is being actively exploited, leading to remote code execution – Read More –
Detected by Check Point researchers, VoidLink is a sophisticated malware framework that can be used to implant malware in the most common cloud environments – Read More –
Cybersecurity researchers issue warning over a surge in attacks designed to trick Facebook users into handing over login credentials – Read More –
Silent Push has discovered a new Magecart campaign targeting six major payment network providers that has been running since 2022 – Read More –
Lawmakers want the security industry to help them scrutinize the Cyber Security and Resilience Bill – Read More –
The Real Cost of a Data Breach: Why Data Protection Is Now a Boardroom Priority – JISA Softech Pvt Ltd
Organizations will start and possibly end with regulatory fines when discussing the cost of data breach. Although the fines imposed on the… The post The Real Cost of a Data Breach: Why Data Protection Is Now a Boardroom Priority appeared first on JISA Softech Pvt Ltd. – Read More – JISA Softech Pvt Ltd
Researchers at Palo Alto’s Unit 42 have outlined a list of recommended security controls for vibe coding tools – Read More –
US agency CISA has retired ten Emergency Directives issued between 2019 and 2024, marking a new step in managing federal cyber-risk – Read More –
California privacy regulator, the CPPA, is cracking down on data brokers trading personal data without authorization – Read More –
World Economic Forum: Cyber-fraud overtakes ransomware as business leaders’ top cyber-security concern –
“Pervasive” threat of phishing, invoice scams and other cyber-enabled fraud is at “record highs”, warns WEF Cybersecurity Outlook 2026 – Read More –
TRM Labs says illegal crypto flows into digital wallets increased to $158bn in 2025 – Read More –