Wiz Security finds four critical RCE vulnerabilities in the Ingress NGINX Controller for Kubernetes – Read More –
Category: Privacy/Governance Feed
VanHelsingRaaS, a new ransomware-as-a-service program, infected three victims within two weeks of release, demanding ransoms of $500,000 – Read More –
Ukraine’s national railway company has suffered a “large-scale” cyber-attack, disrupting online services and operations – Read More –
Authorities in seven African countries have arrested 306 suspects and seized 1842 devices in Operation Red Card – Read More –
Two years after a data breach that compromised almost seven million customers, 23andMe’s CEO has resigned as the company files for bankruptcy – Read More –
The UK’s National Crime Agency has launched a new campaign designed to raise awareness of sextortion among teenage boys – Read More –
Threat actors are looking to compromise Google accounts to further malvertising and data theft – Read More –
Achieving Compliance with India’s Digital Personal Data Protection (DPDP) Act – JISA Softech Pvt Ltd
India’s Digital Personal Data Protection (DPDP) Act, which came into force in July 2024, marks a significant shift in… The post Achieving Compliance with India’s Digital Personal Data Protection (DPDP) Act appeared first on JISA Softech Pvt Ltd. – Read More – JISA Softech Pvt Ltd
Trend Micro observed a continuous development of Albabat ransomware, designed to expand attacks and streamline operations – Read More –
A security researcher has observed threat actors exploiting vulnerabilities in a driver used by CheckPoint’s ZoneAlarm antivirus to bypass Windows security measures – Read More –
Attackers are exploiting user familiarity with CAPTCHAs to distribute the Lumma Stealer RAT via malicious PowerShell commands, according to HP – Read More –
The FishMonger APT Group has been linked with I-SOON, targeting governments, NGOs and think tanks in cyber-espionage campaigns – Read More –
Rooted devices are 250 times more vulnerable to security incidents, Zimperium warned – Read More –
Bridewell has released its annual report on critical infrastructure security leaders’ perceived cybersecurity maturity and threats – Read More –
February’s Operation Henhouse resulted in hundreds of arrests and the seizure of £7.5m – Read More –
The Pennsylvania State Education Association (PSEA) has sent breach notifications to over 500,000 current and former members – Read More –
New NCSC guidance sets out a three-phase migration to post-quantum cryptography, designed to ensure all systems are protected from quantum attacks by 2035 – Read More –
In today’s digital landscape, data privacy is no longer optional—it is an essential pillar of trust and compliance. The… The post Data Masking in the Age of AI: Balancing Innovation and Privacy appeared first on JISA Softech Pvt Ltd. – Read More – JISA Softech Pvt Ltd
Newly discovered vulnerability ZDI-CAN-25373 takes advantage of Windows shortcuts has been exploited by 11 state-sponsored groups since 2017 – Read More –
A surge in browser-based phishing attacks has been recorded over the past year, with a 140% increase compared to 2023 according to Menlo Security – Read More –
World-renowned physicist, Professor Brian Cox, will headline day one of Infosecurity Europe, analyzing the science behind quantum computing and the challenges it brings – Read More –
The US Cybersecurity and Infrastructure Security Agency added flaws in Fortinet and a popular GitHub Action to its Known Exploited Vulnerabilities catalog – Read More –
Security firm Barracuda said it has detected more than a million phishing-as-a-service (PhaaS) attacks in 2025 – Read More –
Gartner has claimed that AI agents will reduce the time it takes to exploit exposed accounts – Read More –
Europol’s annual report warns of a growing threat from aligned state and cybercrime groups, enabled by AI technologies – Read More –
A Cato Networks researcher discovered a new LLM jailbreaking technique enabling the creation of password-stealing malware – Read More –
Report reveals common password use in RDP attacks, highlighting weak credentials remain a major security flaw – Read More –
Leaked chat logs have exposed connections between the BlackBasta ransomware group and Russian authorities, according to new analysis by Trellix – Read More –
Flashpoint data points to a surge in data breaches fueled by compromised credentials, ransomware and exploits – Read More –
Google is set to acquire Wiz, a cloud security platform founded in 2020, for $32bn in an all-cash deal – Read More –
Bitdefender said the malicious app campaign has resulted in more than 60 million downloads of malicious apps from the Google Play Store – Read More –
Bitsight reveals that UK companies are more exposed to cyber risk than global peers via their digital supply chains – Read More –
Cloudflare introduces E2E post-quantum cryptography, enhancing security against quantum threats – Read More –
From March 17, Ofcom will enforce rules requiring tech platforms operating in the UK to remove illegal content, including child abuse material – Read More –
DarkAtlas researchers have uncovered a direct link between BlackLock and the Eldorado ransomware group, confirming a rebranded identity of the notorious threat actor – Read More –
A bipartisan delegation of US Congresspeople and Senators has asked the hearing between the UK government and Apple to be made public – Read More –
Action Fraud reported a spike in social media and email account hacks in 2024, resulting in losses of nearly £1m – Read More –
Common Good Cyber has released a new mapping database designed to help NGOs find the security tools they need – Read More –
Researchers warn that popular open source software package tj-actions has been compromised – Read More –
Data security is a growing concern in India, with Aadhaar data protection being a key aspect of safeguarding personal… The post Securing Aadhaar Data: The Role of Aadhaar Data Vault in Compliance appeared first on JISA Softech Pvt Ltd. – Read More – JISA Softech Pvt Ltd
US authorities have extradited Rostislav Panev on charges of being a developer of the notorious LockBit ransomware – Read More –
Protecting Data Across Industries: Best Practices for Compliance and Security – JISA Softech Pvt Ltd
Data is the backbone of modern enterprises, fueling strategic decisions, operational efficiencies, and customer experiences. However, as organizations increasingly… The post Protecting Data Across Industries: Best Practices for Compliance and Security appeared first on JISA Softech Pvt Ltd. – Read More – JISA Softech Pvt Ltd
Barracuda observed threat actors impersonating the Clop ransomware group via email to extort payments, claiming to have exfiltrated sensitive data – Read More –
Sir Jeremy Fleming spoke during Palo Alto Networks’ Ignite event in London on March 13 – Read More –
Volt Typhoon’s ten-month intrusion of Littleton Electric Light and Water Departments exposes vulnerabilities in the US electric grid – Read More –
In today’s hyper-connected world, the integration of Artificial Intelligence (AI) and the Internet of Things (IoT) is revolutionizing how… The post Protecting AI-Enabled IoT Ecosystems from Cyber Threats appeared first on JISA Softech Pvt Ltd. – Read More – JISA Softech Pvt Ltd
CISA and FBI warn of Medusa ransomware impacting over 300 victims across critical infrastructure sectors with double extortion tactics – Read More –
Microsoft said the ongoing phishing campaign is designed to infect hospitality firms with multiple credential-stealing malware – Read More –
Palo Alto Networks found that nearly two-thirds of UK organizations cited technology complexity as the most significant challenge towards building a sophisticated security posture – Read More –
VC firms invested 35% more in cybersecurity startups in North America and Europe in Q4 2024 than a year previously – Read More –