Teleport study reveals that organizations running over-privileged AI have a 76% incident rate – Read More –
Category: Privacy/Governance Feed
Unit 42 researchers observed a low-skilled threat actor using an LLM to script a professional extortion strategy, complete with deadlines and pressure tactics – Read More –
Dragos annual report warns of a surge in ransomware attacks causing increased operational disruption in industrial environments – Read More –
Hudson Rock has warned OpenClaw users that infostealers are targeting their configuration files – Read More –
The Digital Personal Data Protection (DPDP) Act is a transformative change in the data protection environment in India, the… The post How to build a DPDP-aligned incident and breach response playbook appeared first on JISA Softech Pvt Ltd. – Read More – JISA Softech Pvt Ltd
NCSC’s Richard Horne has warned that cybercriminals do not care about business size and called for SMEs to act now to secure their organizations – Read More –
Security researchers have challenged end-to-end encryption claims from popular commercial password managers – Read More –
New phishing campaign dubbed Operation DoppelBrand targeted major financial firms like Wells Fargo – Read More –
OysterLoader malware evolves into 2026, refining C2 infrastructure, obfuscation & infection stages – Read More –
A high severity vulnerability in Google Chrome and allows remote attackers to execute code – Read More –
Chainalysis warns that online fraud is fuelling sophisticated human trafficking operations – Read More –
Dutch telco Odido has revealed a major data breach impacting over six million customers – Read More –
G7 countries ranked cyber-attacks as the top risk, while BICS members placed cyber threats only as the eighth most pressing risk – Read More –
Hundreds of thousands of users have downloaded malicious AI extensions masquerading as ChatGPT, Gemini, Grok and others, warn cybersecurity researchers at LayerX – Read More –
As the Digital Personal Data Protection Act moves into active enforcement, many organisations across India are reviewing one of… The post How to Rewrite Your Privacy Notice for DPDP Compliance appeared first on JISA Softech Pvt Ltd. – Read More – JISA Softech Pvt Ltd
Accenture Cybersecurity warns over difficult to detect, “sophisticated toolset” being deployed as part of extortion campaigns – Read More –
Google researchers found that government-backed hackers now use AI throughout the whole attack lifecycle – Read More –
New TrendAI report warns that most security tools can’t protect against attacks on AI skills artifacts – Read More –
Flashpoint warns of a dramatic drop in the average time between vulnerability disclosure and exploitation – Read More –
Digital Personal Data Protection (DPDP) Act has changed India’s focus of compliance to data collection to rights-based accountability. Companies are no… The post Data Principal Rights Under DPDP: How to Operationalize Requests in 15 Days appeared first on JISA Softech Pvt Ltd. – Read More – JISA Softech Pvt Ltd
Campaign combines stolen Telegram accounts, fake Zoom calls and ClickFix attacks to deploy infostealer malware – Read More –
A federal court has sentenced crypto-scammer Daren Li to 20 years in absentia – Read More –
This year should break all the records in terms of vulnerability disclosed, reaching or even surpassing 50,000 new CVEs disclosed – Read More –
Six actively exploited zero-day bug have been patched by Microsoft – Read More –
High-volume phishing campaign delivers Phorpiex malware via malicious Windows Shortcut files – Read More –
ZeroDayRAT is a new mobile spyware targeting Android and iOS, offering attackers persistent access – Read More –
Picus Security warns of the increasingly sophisticated ways malicious activity is staying hidden – Read More –
Operation Cyber Guardian was Singapore’s largest and longest running anti-cyber threat law enforcement operation – Read More –
NCSC call firms to ‘act now’ following disruptive malware attacks targeting Polish energy providers – Read More –
The European Commission and government agencies in Finland and the Netherlands have suffered potentially related breaches – Read More –
The Digital Personal Data Protection (DPDP) Act in India transforms the privacy compliance documentation of companies to user experience… The post Designing DPDP Compliant Consent and Notice Flows appeared first on JISA Softech Pvt Ltd. – Read More – JISA Softech Pvt Ltd
Security researchers from LayerX identified a new flaw in 50 Claude Desktop Extensions that could lead to unauthorized remote code execution – Read More –
VoidLink, a Linux-based C2 framework, facilitates credential theft, data exfiltration across clouds – Read More –
Two Connecticut men face federal charges for a $3m scheme targeting online gambling platforms – Read More –
Revolut claims social media sites make £3.8bn annually from scam ads targeting European users – Read More –
The services of Florida-based payments platform BridgePay are offline due to a ransomware attack – Read More –
SecurityScorecard has identified over 40,000 OpenClaw deployments exposed to potential attack – Read More –
CISA has issued a new directive requiring federal agencies to decommission all end of support edge devices within 12 months to reduce ongoing exploitation risks – Read More –
Substack did not specify the number of users affected by the data breach – Read More –
DKnife is a Chinese made malware framework that targets Chinese-based users – Read More –
Infosecurity Europe 2026 will debut a new Cyber Startup Programme, featuring a dedicated show-floor zone for early-stage cybersecurity companies to showcase innovations, connect with investors and highlight emerging technologies – Read More –
Cryptography has become the invisible infrastructure of the digital economy. Every payment, every identity, every medical record, and every… The post Industry-Aligned Cryptography by CryptoBind appeared first on JISA Softech Pvt Ltd. – Read More – JISA Softech Pvt Ltd
Cellebrite data confirms digital evidence is now central to almost all cases – Read More –
Flaws in GitHub Codespaces allow RCE via crafted repositories or pull requests – Read More –
Researchers at Check Point link ‘Amarath-Dragon’ attacks to prolific Chinese cyber-espionage operation – Read More –
Pindrop warns of 1210% increase in AI-powered fraud last year – Read More –
Are You a Data Fiduciary or a Significant Data Fiduciary? Here’s How to Classify Yourself – JISA Softech Pvt Ltd
The Digital Personal Data Protection (DPDP) Act, 2023 in India has been a pivot in the privacy debate moving it… The post Are You a Data Fiduciary or a Significant Data Fiduciary? Here’s How to Classify Yourself appeared first on JISA Softech Pvt Ltd. – Read More – JISA Softech Pvt Ltd
SystemBC malware linked to 10,000 infected IPs, posing risks to sensitive government infrastructure – Read More –
ShadowSyndicate cluster expands with new SSH fingerprints connecting servers to other ransomware ops – Read More –
Cofense claims AI is making phishing emails more personalized and sophisticated – Read More –