NETSCOUT RESEARCH CONFIRMS DDOS CONTINUES TO DOMINATE THE DIGITAL BATTLEFIELD, DESTABILIZING CRITICAL INFRASTRUCTURE

NEW NETSCOUT RESEARCH CONFIRMS DDOS CONTINUES TO DOMINATE THE DIGITAL BATTLEFIELD, DESTABILIZING CRITICAL INFRASTRUCTURE   AI integration, persistent hacktivist campaigns, and nation-state actors weaponize DDoS attacks, creating unprecedented risks for organizations globally   NetScout released its latest research detailing the evolving Distributed Denial-oSet featured imagef-Service (DDoS) attack landscape. NETSCOUT monitored more than 8 million DDoS…

Read More

Security by design starts at the whiteboard stage: Srinivas Shekar, CEO, Pantherun Technologies

Pantherun Technologies was founded by Srinivas Shekar (CEO) and Tiffany Chan (COO). It was officially launched on 25th September 2019 and is headquartered out of Bangalore, with offices in Germany, Taiwan and the United States. Security by design starts at the whiteboard stage & security needs to be part of the first conversation: What sets…

Read More

Massive Interpol operation takes down 11,500 malicious networks in Africa

In  a sweeping effort conducted between June and August 2025, INTERPOL led Operation Serengeti 2.0 targeting cybercrime networks across Africa. Investigators from 18 African countries alongside the United Kingdom collaborated to combat ransomware, online scams, business email compromise (BEC), and other significant cyber threats noted in INTERPOL’s Africa Cyberthreat Assessment Report. The three-month investigation, launched…

Read More

NIST Finalizes ‘Lightweight Cryptography’ Standard To Protect Internet of Things (IoT) Devices

The National Institute of Standards and Technology (NIST) has finalized four lightweight cryptographic algorithms designed to safeguard data generated and transmitted by the Internet of Things (IoT) and other small-scale technologies. Unlike larger computers, many connected devices—such as smart home systems, fitness trackers, and other IoT applications—lack the processing power and memory to run conventional…

Read More

Google issues red alert as new cyber attack targets Gmail users using AI with ‘indirect prompt injections’

Google warns its 1.8 billion Gmail users about a new cybersecurity threat called indirect prompt injections, where hackers hide malicious commands in emails. Google warns of wave of new threats This threat affects not just people but also businesses and governments, in a post Google explained the danger, “With the rapid adoption of generative AI,…

Read More

Pharmaceutical firm Inotiv investigating ransomware attack

American contract research organization Inotiv disclosed Monday that it became aware of a cybersecurity incident affecting certain of its systems and data earlier this month. Its preliminary investigation determined that a threat actor gained unauthorized access to, and encrypted certain of, the company’s systems, while investigations into the incident are ongoing. “Upon identifying encrypted systems, the…

Read More

Tenable Launches AI Exposure Tool to Manage Generative AI Risks in Enterprise Environement

Tenable®, the exposure management company, announced a significant expansion of its market-leading Tenable One platform with the launch of Tenable AI Exposure, a comprehensive solution to see, manage and control the risks introduced by generative AI. Unveiled at Black Hat USA 2025, these new capabilities provide an end-to-end approach that moves beyond discovery to include…

Read More

Rise in Deepfake AI Trading Scams Target Global Investors

The growing popularity and complexity of AI is being used to lure investors into scams. Look out for these red flags to help keep your money safe: Unregistered/Unlicensed Investment Platforms Claiming to Use AI Investors should remember that federal and state securities laws generally require securities firms, professionals, exchanges, and other investment platforms to be…

Read More

Financial impact from severe OT related threats rise to $300B

$330 Billion OT Cyber Risk impacting business at large OT networks under active attack due to critical RCE flaw Attackers are exploiting a critical remote code execution (RCE) vulnerability in the Erlang programming language’s Open Telecom Platform, widely used in OT networks and critical infrastructure. The flaw enables unauthenticated users to execute commands through SSH…

Read More

Accenture announces the acquisition of Australian cyber security operator CyberCX, to boost APEC cyber offerings

Accenture has announced the acquisition of Australian cyber security operator CyberCX, a move the company said will boost its security offerings in the Asia-Pacific region. “Client demand for cyber security services is accelerating as data and digital environments become increasingly connected and heightened threats are exposed across operational value chains, supply chains and the enterprise….

Read More