The US Department of Justice has announced the seizure of domains, servers and $1m in proceeds from the BlackSuit ransomware group – Read More –
Category: Privacy/Governance Feed
Microsoft announced updates for 107 vulnerabilities on Patch Tuesday, including one zero-day – Read More –
In 2025, the semiconductor supply chain in the world is at its most volatile. Having been previously run on… The post Securing the Semiconductor Supply Chain: 2025 Landscape appeared first on JISA Softech Pvt Ltd. – Read More – JISA Softech Pvt Ltd
In a new investigation launched at DEFCON 33, Analyst1’s Jon DiMaggio revealed probable Russian government involvement in the Kaseya attack – Read More –
A new technique has bypassed GPT-5’s safety systems via narrative-driven steering to elicit harmful output – Read More –
Over 29,000 Microsoft Exchange servers remain unpatched against a vulnerability that could allow attackers to seize control of entire domains in hybrid cloud environments – Read More –
The sophisticated campaign aims to steal credentials of sponsor license holders to facilitate immigration fraud, extortion and other monetization schemes – Read More –
Rapid7 found that threat actors are able to purchase low-cost initial access broker services, with many packages offering a variety of options – Read More –
While “fairly primitive”, APT28’s LameHug was a testbed for future AI-powered attacks, said two MITRE experts during Black Hat USA 2025 – Read More –
New threat intelligence points to targeting of financial services and technology sectors by ShinyHunters group – Read More –
Threat actors have stolen data on at least half a million cancer screening patients – Read More –
A cyber-attack at Connex Credit Union has compromised data of 172,000 individuals, including sensitive information – Read More –
A flaw in WinRAR, tracked as CVE-2025-8088, has been exploited by the RomCom group to deploy malware – Read More –
Four senior members of a Ghana-based criminal network have been indicted for stealing over $100 million through romance scams and BEC frau – Read More –
TRM Labs observed crypto payments worth $34.2m moved from victims addresses to a range of destinations likely associated with the group – Read More –
Eight European countries have yet to transpose NIS2 into law, exposing them to regulatory action – Read More –
Commercial red team experts believe AI’s current impact on cyber is overstated – Read More –
The Unified Payments Interface (UPI) is the pulse of India’s Digital Economy with more than 13 billion transactions per… The post Protecting UPI: How Tokenization Keeps Real-Time Payments Safe appeared first on JISA Softech Pvt Ltd. – Read More – JISA Softech Pvt Ltd
The winners of the AI Cybersecurity Challenge (AIxCC), Team Atlanta, won a $4m prize – Read More –
Leaders of the US Cybersecurity and Infrastructure Agency (CISA) pushed back on layoff concerns and highlighted new initiatives – Read More –
The Information Commissioner has applied for a civil penalty against Optus following the 2022 data breach that exposed the personal details of 9.5 million Australians – Read More –
The judiciary announced stronger protections for its case management system following reports of a major breach of sensitive court documents in multiple states – Read More –
Accelerated digitalization, embedded finance, and the clear regulatory environment have been precipitating the swift transformation of the fintech ecosystem… The post How India’s fintech fraud patterns are evolving in 2025 appeared first on JISA Softech Pvt Ltd. – Read More – JISA Softech Pvt Ltd
Bouygues Telecom revealed the attackers stole personal data of 6.4 million customers, including contact details, contractual data and international bank account numbers – Read More –
The NSA’s CAPT program, launched in 2024 with Horizon3.ai, now benefits 1000 of the 300,000 US Defense Industrial Base companies – Read More –
A new Microsoft AI agent, named Project Ire, is able to autonomously classify malware at a global scale with a high level of precision – Read More –
Microsoft Exchange customers have been urged to apply fixes set out in a hybrid deployment security update published in April – Read More –
Google confirms it was among the victims of an ongoing data theft campaign targeting Salesforce instances, where publicly available business names and contact details were retrieved by the threat actor – Read More –
In the context of the current digital environment, the API has turned into the life force of the digital… The post Guarding the Data Goldmine: Strategies for API-Driven Security appeared first on JISA Softech Pvt Ltd. – Read More – JISA Softech Pvt Ltd
A UK government initiative to tackle Companies House fraud has raised security concerns – Read More –
SonicWall has claimed an uptick in Akira ransomware intrusions is due to legacy password use – Read More –
Claroty researchers have uncovered four vulnerabilities in a proprietary protocol used by surveillance equipment manufacturer Axis Communications – Read More –
According to Infoblox’s new report, the VexTrio cybercrime-enabling network originates from Italy and Eastern Europe – Read More –
The incident, reported to be ransomware-related, has resulted in attackers stealing sensitive personal and clinical data, including lab test results – Read More –
A Nigerian man accused of hacking, fraud and identity theft has been extradited from France to the US to face charges – Read More –
GenAI company OpenAI has launched its first-ever open-weight models alongside a red teaming challenge – Read More –
During the pre-Black Hat AI Summit, Sean Morgan, Protect AI’s Chief Architect, highlighted the three most prominent security risks of using AI agents – Read More –
Adversaries are prioritizing stealth over scale, according to OPSWAT’s latest Threat Landscape Report – Read More –
Trend Micro has released a temporary fix for the flaws, which enable remote code execution on on-prem Apex One machines – Read More –
Ransomware actors deploy a range of activities to make it harder for victims to recover and increase the consequences of not paying demands – Read More –
The UK’s National Cyber Security Centre has released the Cyber Assessment Framework 4.0 – Read More –
Within the next decade, the encryption that safeguards your business’s most sensitive data could be shattered — not by… The post Countdown to QDay: Is Your Data Ready for the Quantum Reckoning? appeared first on JISA Softech Pvt Ltd. – Read More – JISA Softech Pvt Ltd
Chanel and Pandora have revealed data breaches reportedly linked to attacks on their Salesforce instances – Read More –
Experts, including Allan Friedman, CISA’s leading voice on SBOMs until July 2025, emphasized that AI BOMs should be standardized before being implemented – Read More –
SecAlliance highlighted the evolution in smishing campaigns orchestrated by Chinese syndicates, which exploit digital wallet tokenization – Read More –
Critical vulnerabilities in NVIDIA’s Triton Inference Server, discovered by researchers, could allow unauthenticated attackers to gain full server control through remote code execution – Read More –
IANS found that stagnant budget growth rates have significantly impacted CISOs ability to increase their teams’ headcount – Read More –
SecurityScorecard analysis highlights wide variety of Iranian threat actors and coordination with military activity – Read More –
Cifas noted a record number of filings in its National Fraud Database for the first half of 2025 – Read More –
The BFSI (Banking, Financial Services, and Insurance) industry is experiencing constant pressure on cybersecurity issues in the ever-growing digital… The post Why BFSI needs column-level encryption appeared first on JISA Softech Pvt Ltd. – Read More – JISA Softech Pvt Ltd