India one of top 3 countries originating IoT malware: Microsoft’s Cyber Signals Report 2022 Microsoft has released the third edition of its Cyber Signals Report, which includes information on the increasing cyber risks to critical infrastructure posed by the Internet of Things (IoT) and Operational Technology (OT). The report provides insights on current cyber threats, with a focus on recent ...
Read More »Cyber Security News
The evolving landscape of OT security in the era of IT/OT convergence
The evolving landscape of OT security in the era of IT/OT convergence Historically, information technology (IT) environments have always been at the forefront of the majority of cyber attacks, unlike operational technology (OT) environments which have traditionally operated in isolation with separate organizational units, and with separate technologies, standards, governance, and security practices. The exposure to cyber threats was also ...
Read More »Critical infra organisations must upgrade security to avoid AIIMS-like attacks, say experts
Critical infra organisations must upgrade security to avoid AIIMS-like attacks, say experts The recent cyberattack on the All India Institute of Medical Sciences (AIIMS) has once again put the spotlight on cybersecurity practices at government and critical infrastructure organisations in India. Even as enterprises have increased their cybersecurity spends, experts said critical infrastructure such as power plants, hospitals and railways ...
Read More »Why CIOs must take a proactive data protection & security approach
Why CIOs must take a proactive data protection & security approach Highlights Modern data protection tools and techniques enable enterprises to handle data on a petabyte scale, while also assisting them in complying with stricter privacy and security laws. It also provides resilience against both internal and external threats., With users and employees working remotely, data now gets stored ...
Read More »North Korean cyber spies deploy new tactic: Tricking foreign experts into writing research for them
North Korean cyber spies deploy new tactic: Tricking foreign experts into writing research for them Seoul: When Daniel DePetris, a U.S.-based foreign affairs analyst, received an email in October from the director of the 38 North think-tank commissioning an article, it seemed to be business as usual. It wasn’t. The sender was actually a suspected North Korean spy seeking information, ...
Read More »Proceeds of crime of over Rs 1000 cr of cyber and crypto assets frauds seized
Proceeds of crime of over Rs 1000 cr of cyber and crypto assets frauds seized Enforcement Directorate New Delhi: Proceeds of crime of more than Rs 1000 crore related to cyber and crypto assets frauds have been attached or seized under the provisions of Prevention of Money Laundering Act, 2002 (PMLA), the Government informed the Lok Sabha on Monday. Besides, ...
Read More »Cybercrooks pull off Rs 50 lakh heist with just blank calls
Cybercrooks pull off Rs 50 lakh heist with just blank calls A director of a south Delhi-based security services firm lost Rs 50 lakh to cybercrooks, who diverted the money by repeatedly giving him blank and missed calls on his cellphone. Interestingly, they did not ask for any OTP. The victim received a flurry of calls between 7pm and 8.45pm ...
Read More »First step to better data security: Know who’s getting access to your cloud data
First step to better data security: Know who’s getting access to your cloud data Image source: Stack Identity What’s common between Uber, Cisco, and some of the recent high-profile data breaches, is MFA fatigue – an exploit through which attackers utilized multi-factor authentication solutions and bypassed vulnerabilities to gain access to the company’s cloud services and network. These incidents ...
Read More »How tech companies can slow down spike in breaches: Michael Sentonas, CTO, CrowdStrike
How tech companies can slow down spike in breaches: Michael Sentonas, CTO, CrowdStrike By- Michael Sentonas Tech companies have created the tools we use to build and run businesses, process consumer transactions, communicate with one another, and organize our personal and professional lives. Technology has shaped the modern world as we know it – and our reliance on tech continues ...
Read More »Eying better digital adaptability, Centre to exempt startups from Data Protection Bill provisions
Eying better digital adaptability, Centre to exempt startups from Data Protection Bill provisions Eying better future digital adaptability across sectors, the Union government plans grant an early stage exemption for early stage startups ecosystem. According to the Ministry of Electronics and Information Technology sources, the Centre is likely to exempt new age start-ups from complying with norms under proposed Digital ...
Read More »