A database featuring 300,000+ users of notorious hacking forum BreachForums has been leaked online – Read More –
Category: Privacy/Governance Feed
As companies continue with their digital transformation processes, the pressure to maintain constant compliance with data protection is mounting…. The post 2025-2026 Roadmap: Maintaining Continuous Data Protection Compliance appeared first on JISA Softech Pvt Ltd. – Read More – JISA Softech Pvt Ltd
Welcome to WordPress. This is your first post. Edit or delete it, then start writing! – Read More – CryptoBind | HSM Provider in India | Aadhaar Data Vault | Data Security Solution
Europol-backed operation targets group behind numerous BEC attacks and romance scams – Read More –
Researchers at the World Economic Forum have shown that threat actors can use commercial deepfake tools to bypass corporate security protections – Read More –
Check Point has uncovered a vast, AI-powered scam operation dubbed the “Truman Show” – Read More –
The FBI says North Korea’s Kimsuky APT group is using QR codes in spear phishing campaigns – Read More –
Researchers at Radware discovered new prompt injection attacks in ChatGPT agentic features – Read More –
The GoBruteforcer botnet has been observed targeting exposed Linux servers on services like FTP and MySQL – Read More –
A long-term cyber-espionage campaign targeting South Asia’s telecom firms has been linked to UAT-7290 – Read More –
Misconfigurations abused to make phishing emails look like they come from within the organization – Read More –
Absolute Security claims that full recovery from endpoint-related downtime can take up to a fortnight for most organizations – Read More –
The Trump administration decided to leave 66 international organizations, including the GFCE and the European Centre of Excellence for Countering Hybrid Threats – Read More –
A newly discovered vulnerability in authentication platform n8n could allow threat actors to take control of n8n servers – Read More –
In many organizations, security looks strong on paper. Policies are documented, audits are passed, and compliance dashboards glow reassuringly… The post Cryptography vs Security Theatre appeared first on JISA Softech Pvt Ltd. – Read More – JISA Softech Pvt Ltd
Malicious Windows packer named pkr_mtsi used as a flexible malware loader in malvertising campaigns – Read More –
New Android malware enables unauthorized tap-to-pay transactions without physical access to bank cards – Read More –
Taiwan recorded an average of 2.63 million cyber intrusion attempts to it critical infrastructure per day coming from China in 2025 – Read More –
Lack of visibility and governance around employees using generative AI is resulting in rise in data security risks – Read More –
Threat actor “Zestix” was able to breach around 50 firms using infostealers because they lacked multi-factor authentication – Read More –
A hacking collective claims it has disconnected customers of US ISP Brightspeed – Read More –
A breach affecting Manage My Health could have exposed sensitive data for up to 120,000 New Zealand patients – Read More –
A breach affecting Manage My Health could have exposed sensitive data for up to 120,000 New Zealand patients – Read More –
A high-severity security flaw in Open WebUI Direct Connections risks account takeover and server compromises – Read More –
Multi-stage malware campaign targets hospitality organizations using social engineering and abuse of MSBuild.exe – Read More –
UK government’s new Cyber Action plan looks to provide more ‘hands-on’ support for protecting against and responding to security incidents – Read More –
JLR’s wholesale sales plunged 43% and retail drops 25% in the third quarter of 2025 following the 2025 cyber-attack – Read More –
Privacy-Enhancing Technologies: The New Foundation of Enterprise Data Protection – JISA Softech Pvt Ltd
Over the years, the concept of enterprise data protection strategies has been based on a known trio perimeter security, access controls,… The post Privacy-Enhancing Technologies: The New Foundation of Enterprise Data Protection appeared first on JISA Softech Pvt Ltd. – Read More – JISA Softech Pvt Ltd
Ilya Lichtenstein, convicted for the 2016 Bitfinex hack, has been released early from prison to home confinement – Read More –
A new Python-based malware called VVS stealer has been identified, targeting Discord users with stealthy techniques to steal data – Read More –
The European Space Agency has said that external servers were recently involved in a security “issue” – Read More –
TRM Labs says it has recorded $35m drained from users’ wallets following 2022 LastPass breach – Read More –
For most startups and small-to-medium enterprises (SMEs), the Digital Personal Data Protection (DPDP) Act feels like a high-stakes puzzle:… The post Budget friendly DPDP Compliance for Startups & SMEs appeared first on JISA Softech Pvt Ltd. – Read More – JISA Softech Pvt Ltd
Explore Infosecurity Magazine’s most-read cybersecurity stories of 2025, from major vendor shake-ups and zero-day exploits to AI-driven threats and supply chain attacks – Read More –
The global cryptographic space is changing in a way that has not happened for many years. Quantum computing is… The post Post-Quantum Security: How GCC Governments Are Planning the Shift appeared first on JISA Softech Pvt Ltd. – Read More – JISA Softech Pvt Ltd
In an era defined by the exponential expansion of digital footprints, organisations are under unprecedented pressure to demonstrate disciplined… The post Data Retention & Automatic Erasure: How to Build a Compliant Workflow appeared first on JISA Softech Pvt Ltd. – Read More – JISA Softech Pvt Ltd
In an era defined by the exponential expansion of digital footprints, organisations are under unprecedented pressure to demonstrate disciplined… The post Data Retention & Automatic Erasure: How to Build a Compliant Workflow appeared first on JISA Softech Pvt Ltd. – Read More – JISA Softech Pvt Ltd
The SEC has charged several crypto platforms and investment clubs for defrauding US investors of more than $14m – Read More –
A coordinated wave of fake online job ads targeting the Middle East and North Africa has been uncovered, exploiting remote work trends – Read More –
NIST and MITRE are collaboratively launching two centers to advance AI security for US manufacturing and critical infrastructure – Read More –
French postal service warns of “major network incident” just before Christmas – Read More –
ServiceNow is set to acquire Armis for $7.75bn in a cash-only deal expected to close in the second half of 2026 – Read More –
The global acceleration of privacy regulation DPDP Act, GDPR, DIFC DP Law, PDPL (UAE), and evolving sectoral mandates has… The post Step-by-Step Guide to Implementing 72-Hour Breach Reporting appeared first on JISA Softech Pvt Ltd. – Read More – JISA Softech Pvt Ltd
A newly discovered macOS malware mimics legitimate apps code-signed and notarized by Apple – Read More –
A University of Phoenix data breach affecting nearly 3.5 million individuals has been claimed by the Clop ransomware collective – Read More –
Infosecurity has selected some of the key ransomware statistics for 2025 – Read More –
The Middle East and Africa region is moving through a fast digital shift. This shift covers national identity programs,… The post AI-Powered Attacks in MEA: Deepfakes, Automation & New Threat Vectors appeared first on JISA Softech Pvt Ltd. – Read More – JISA Softech Pvt Ltd
Nissan has revealed that over 20,000 customers have had personal information compromised in a third-party data breach – Read More –
Operational Sentinel helps to crack down on cybercrime across 19 African countries in a month-long campaign – Read More –
NordVPN has warned that malicious postal service websites have surged by 86% over the past month, targeting holiday delivery tracking – Read More –