Endor Labs has published details of six new vulnerabilities in popular AI assistant OpenClaw – Read More –
Category: Privacy/Governance Feed
Since the Digital Personal Data Protection (DPDP) regime in India is already shifting towards enforcement and not interpretation, organizations are coming… The post Choosing and Implementing a DPDP Tech Stack: Consent, Logs, and Governance appeared first on JISA Softech Pvt Ltd. – Read More – JISA Softech Pvt Ltd
Cryptojacking campaign used pirated software to deploy a persistent XMRig miner with stealth tactics – Read More –
AIs like Grok and Microsoft Copilot can be exploited as covert C2 channels for malware communication – Read More –
Searchlight Cyber reports a 30% annual increase in ransomware victim numbers in 2025 – Read More –
Mandiant reveals campaign featuring exploit of a CVSS 10.0 CVE in Dell RecoverPoint for Virtual Machines – Read More –
Android 17 Beta introduces privacy, security updates and a new Canary channel for improved development – Read More –
iOS 26.4 Beta adds end-to-end encryption for RCS messaging and enhanced Memory Integrity Enforcement – Read More –
Teleport study reveals that organizations running over-privileged AI have a 76% incident rate – Read More –
Unit 42 researchers observed a low-skilled threat actor using an LLM to script a professional extortion strategy, complete with deadlines and pressure tactics – Read More –
Dragos annual report warns of a surge in ransomware attacks causing increased operational disruption in industrial environments – Read More –
Hudson Rock has warned OpenClaw users that infostealers are targeting their configuration files – Read More –
The Digital Personal Data Protection (DPDP) Act is a transformative change in the data protection environment in India, the… The post How to build a DPDP-aligned incident and breach response playbook appeared first on JISA Softech Pvt Ltd. – Read More – JISA Softech Pvt Ltd
NCSC’s Richard Horne has warned that cybercriminals do not care about business size and called for SMEs to act now to secure their organizations – Read More –
Security researchers have challenged end-to-end encryption claims from popular commercial password managers – Read More –
New phishing campaign dubbed Operation DoppelBrand targeted major financial firms like Wells Fargo – Read More –
OysterLoader malware evolves into 2026, refining C2 infrastructure, obfuscation & infection stages – Read More –
A high severity vulnerability in Google Chrome and allows remote attackers to execute code – Read More –
Chainalysis warns that online fraud is fuelling sophisticated human trafficking operations – Read More –
Dutch telco Odido has revealed a major data breach impacting over six million customers – Read More –
G7 countries ranked cyber-attacks as the top risk, while BICS members placed cyber threats only as the eighth most pressing risk – Read More –
Hundreds of thousands of users have downloaded malicious AI extensions masquerading as ChatGPT, Gemini, Grok and others, warn cybersecurity researchers at LayerX – Read More –
As the Digital Personal Data Protection Act moves into active enforcement, many organisations across India are reviewing one of… The post How to Rewrite Your Privacy Notice for DPDP Compliance appeared first on JISA Softech Pvt Ltd. – Read More – JISA Softech Pvt Ltd
Accenture Cybersecurity warns over difficult to detect, “sophisticated toolset” being deployed as part of extortion campaigns – Read More –
Google researchers found that government-backed hackers now use AI throughout the whole attack lifecycle – Read More –
New TrendAI report warns that most security tools can’t protect against attacks on AI skills artifacts – Read More –
Flashpoint warns of a dramatic drop in the average time between vulnerability disclosure and exploitation – Read More –
Digital Personal Data Protection (DPDP) Act has changed India’s focus of compliance to data collection to rights-based accountability. Companies are no… The post Data Principal Rights Under DPDP: How to Operationalize Requests in 15 Days appeared first on JISA Softech Pvt Ltd. – Read More – JISA Softech Pvt Ltd
Campaign combines stolen Telegram accounts, fake Zoom calls and ClickFix attacks to deploy infostealer malware – Read More –
A federal court has sentenced crypto-scammer Daren Li to 20 years in absentia – Read More –
This year should break all the records in terms of vulnerability disclosed, reaching or even surpassing 50,000 new CVEs disclosed – Read More –
Six actively exploited zero-day bug have been patched by Microsoft – Read More –
High-volume phishing campaign delivers Phorpiex malware via malicious Windows Shortcut files – Read More –
ZeroDayRAT is a new mobile spyware targeting Android and iOS, offering attackers persistent access – Read More –
Picus Security warns of the increasingly sophisticated ways malicious activity is staying hidden – Read More –
Operation Cyber Guardian was Singapore’s largest and longest running anti-cyber threat law enforcement operation – Read More –
NCSC call firms to ‘act now’ following disruptive malware attacks targeting Polish energy providers – Read More –
The European Commission and government agencies in Finland and the Netherlands have suffered potentially related breaches – Read More –
The Digital Personal Data Protection (DPDP) Act in India transforms the privacy compliance documentation of companies to user experience… The post Designing DPDP Compliant Consent and Notice Flows appeared first on JISA Softech Pvt Ltd. – Read More – JISA Softech Pvt Ltd
Security researchers from LayerX identified a new flaw in 50 Claude Desktop Extensions that could lead to unauthorized remote code execution – Read More –
VoidLink, a Linux-based C2 framework, facilitates credential theft, data exfiltration across clouds – Read More –
Two Connecticut men face federal charges for a $3m scheme targeting online gambling platforms – Read More –
Revolut claims social media sites make £3.8bn annually from scam ads targeting European users – Read More –
The services of Florida-based payments platform BridgePay are offline due to a ransomware attack – Read More –
SecurityScorecard has identified over 40,000 OpenClaw deployments exposed to potential attack – Read More –
CISA has issued a new directive requiring federal agencies to decommission all end of support edge devices within 12 months to reduce ongoing exploitation risks – Read More –
Substack did not specify the number of users affected by the data breach – Read More –
DKnife is a Chinese made malware framework that targets Chinese-based users – Read More –
Infosecurity Europe 2026 will debut a new Cyber Startup Programme, featuring a dedicated show-floor zone for early-stage cybersecurity companies to showcase innovations, connect with investors and highlight emerging technologies – Read More –
Cryptography has become the invisible infrastructure of the digital economy. Every payment, every identity, every medical record, and every… The post Industry-Aligned Cryptography by CryptoBind appeared first on JISA Softech Pvt Ltd. – Read More – JISA Softech Pvt Ltd