Only 24% of organizations test identity disaster recovery plans every 6 months, Quest Software said – Read More –
Category: Privacy/Governance Feed
Ericsson data breach affects 15k employees/customers after third-party service provider compromise – Read More –
Google Cloud report details a sharp rise in attackers exploiting software vulnerabilities, including React2Shell – Read More –
Dutch intelligence reveals Russian state hackers are trying to hijack the Signal and WhatsApp accounts of key targets – Read More –
Prolific ShinyHunters group claims to have stolen data from nearly 400 websites in Experience Cloud attacks – Read More –
The financial ecosystem in India is changing radically. As digital banking, fintech networks, UPI-based applications and API-driven financial services… The post Designing a DPDP-Ready Crypto Architecture for BFSI & Fintech appeared first on JISA Softech Pvt Ltd. – Read More – JISA Softech Pvt Ltd
Huntress researchers uncover campaign exploiting vulnerabilities to steal data using Elastic Cloud as a data hub – Read More –
US national cyber strategy focuses on stronger defenses, countering threats, fostering innovation – Read More –
Over one in five winners of IT-Harvest’s 2026 Cyber 150 are AI security companies – Read More –
New UK Online Crime Centre will combine expertise from a range of sources to takedown online channels cyber-scammers rely on – Read More –
Derrick Van Yeboah admitted he stole over $10m in romance scams as part of crime gang – Read More –
Billing services provider TriZetto Provider Solutions has begun notifying millions of patients about a data breach – Read More –
A bank, an airport, a non-profit and the Israeli branch of a US software company were among the targets of this new MuddyWater campaign – Read More –
Almost a quarter of the zero days detected by Google in 2025 targeted security and networking appliances – Read More –
Malicious insiders are using misusing AI for nefarious gain, while employees cutting corners also creates risk, warns Mimecast – Read More –
Critical flaw “ContextCrush” in Context7 MCP Server could allow malicious instructions into AI tools – Read More –
Exploit kit “Coruna” targets iPhones running iOS 13.0 to 17.2.1, focusing on financial data theft – Read More –
Ox Security warns that Mail2Shell could enable threat actors to hijack FreeScout systems without user interaction – Read More –
A global operation has resulted in the takedown of popular cybercrime forum LeakBase – Read More –
Two of the 48 Cisco vulnerabilities, affecting Secure Firewall Management Center, are maximum-severity flaws – Read More –
Nowadays, information is among the most precious resources of companies and states in the digital age. The cross-border and system-to-system… The post Why India Needs Indigenous HSMs for DPDP Act and RBI Compliance appeared first on JISA Softech Pvt Ltd. – Read More – JISA Softech Pvt Ltd
A coalition of seven Western nations has launched guidelines to help integrate security-by-design principles into future 6G standards – Read More –
Law enforcers and industry partners have taken down notorious phishing-as-a-service platform Tycoon2FA – Read More –
Malware campaign uses Ukrainian email service for credibility, deploying “BadPaw” to execute attacks – Read More –
Increased attempts to compromise surveillance cameras linked to Iran during Middle East conflict – Read More –
The OpenID Foundation warns that fragmented policies on posthumous digital accounts could open the door for fraudsters to exploit AI deepfakes – Read More –
Espionage campaign exploits Israel-Iran conflict, distributing a trojanized Red Alert app via SMS – Read More –
Cloudflare Threat Report warns that AI tools enable attackers who lacked required skills to generate effective attacks rapidly and at scale – Read More –
Seemplicity finds US security leaders work 11 or more extra hours per week – Read More –
Ariomex database reveals potential sanctions evasion and capital transfers tied to Iranian actors – Read More –
Black Kite reveals 26,000 unnamed corporate victims linked to 136 third-party breaches – Read More –
Zscaler ThreatLabz assessed with medium to high confidence that an Iranian adversary targeted Iraq’s Ministry of Foreign Affairs in a new cyber-attack – Read More –
The Digital Personal Data Protection Act, 2023 (DPDP Act) in India is a structural change in the manner in… The post DPDP Act Phase 1: 10 Security Safeguards Every CISO Must Implement appeared first on JISA Softech Pvt Ltd. – Read More – JISA Softech Pvt Ltd
John Hultquist suggests “aggressive” Iranian cyber attackers will target the US and its Gulf allies with plausibly deniable ransomware attacks, hacktivist campaigns and more – Read More –
Google Chrome initiates quantum-resistant measures via Merkle Tree Certificates to secure HTTPS – Read More –
Military strikes in the Middle East escalate cyber ops, raising spillover risks globally for firms – Read More –
Oasis Security reveals how a new ClawJacked vulnerability could allow attackers to silently take over a victim’s OpenClaw agent – Read More –
Chainalysis reveals a big surge in median ransomware payment size in 2025 despite overall drop in criminal revenue – Read More –
The security researchers from Zscaler ThreatLabz have also discovered five new tools deployed by the North Korean hacking group – Read More –
The UK government says its new Vulnerability Monitoring Service has cut unresolved security flaws by 75% and reduced cyber-attack fix times from nearly two months to just over a week – Read More –
International law enforcement operation led by Europol targets network of teenagers and young adults involved in ransomware attacks, extortion and other crimes – Read More –
New botnet Aeternum shifted C2 operations to Polygon blockchain, complicating takedown efforts – Read More –
2025 saw 32M phishing emails, with identity threats surpassing vulnerabilities – Read More –
The UK’s Information Commissioner’s Office is about to ditch single-leader model for CEO and board in a major shake-up – Read More –
Datadog report reveals two-fifths of services are affected by exploitable bugs – Read More –
UNC2814 hit 53 victims in 42 countries with novel backdoor in decade long cyber espionage operation – Read More –
The US and allies are urging Cisco Catalyst SD-WAN customers to hunt for signs of exploitation – Read More –
From Policy to Practice: How Indian Companies Can Audit Their DPDP Compliance Annually – JISA Softech Pvt Ltd
The Digital Personal Data Protection Act, 2023 (DPDP Act) in India has transformed the compliant dialogue into a policy-making enterprise to… The post From Policy to Practice: How Indian Companies Can Audit Their DPDP Compliance Annually appeared first on JISA Softech Pvt Ltd. – Read More – JISA Softech Pvt Ltd
IBM’s 2026 X-Force report reveals 44% rise in cyber-attacks on public apps, driven by AI and flaws – Read More –
Malicious NuGet package mimicking Stripe’s library targeted developers – Read More –