Deepwatch Expands its Footprint in India with a New GCC in Bengaluru to Advance AI-Driven Cybersecurity Innovation

Deepwatch, the leader in Precision MDR powered by AI + Humans, today announced the official opening of its new office in Bengaluru, India, marking a significant milestone in the company’s continued global expansion strategy. The state-of-the-art facility will serve as a key engineering and technology hub as the company continues to scale its research and…

Read More

Cisco boosts phase-out of insecure legacy with new initiative

Cisco is phasing out insecure legacy features and hardening device configurations as part of a new resilient infrastructure initiative. The effort is a direct response to threats from AI-powered attacks ansecurity, Secure by default, AI Attack, d prepares networks for post-quantum cryptography. In the process, it is making secure-by-default the baseline. Organizations face escalating risks…

Read More

OpenAI Confirms Mixpanel Breach Impacting API User Data

OpenAI has confirmed a security incident involving Mixpanel, a third-party analytics provider used for its API product frontend. The company clarified that the OpenAI Mixpanel security incident stemmed solely from a breach within Mixpanel’s systems and did not involve OpenAI’s infrastructure. According to the initial investigation, an attacker gained unauthorized access to a portion of Mixpanel’s environment…

Read More

Cyber specialist Method Security raises $26 million

Method Security, a dual-use company combining cyber expertise with AI speed, raised $26 million across its seed round and Series A. The funds will be used to accelerate deployment of its autonomous cyber platform, with significant investor participation.  Other participants included Blackstone Innovations Investments, Crossbeam Ventures, NFDG, Forward Deployed Ventures, Pax Ventures, WndrCo, and several…

Read More

CrowdStrike Fires Insider for Sharing Internal System Details with Hackers

Cybersecurity giant CrowdStrike has confirmed the termination of an insider who allegedly provided sensitive internal system details to a notorious hacking collective. The incident, which came to light last week, involved the leak of internal screenshots on a public Telegram channel operated by the threat group known as “Scattered Lapsus$ Hunters.” The leaks surfaced when…

Read More

Chinese Cyberspies Deploy ‘BadAudio’ Malware via Supply Chain Attacks

APT24, a threat actor referred from Chinese cyber criminal group,  has been observed employing multiple techniques to deploy malware as part of a three-year-long cyberespionage campaign, Google reports. Also tracked as G0011, Pitty Panda, and Pitty Tiger, APT24 has been active since at least 2008, mainly relying on spear phishing and social engineering to achieve its…

Read More

Hackers Using New Matrix Push C2 to Deliver Malware & Phishing Attacks via Web Browser

Hackers are turning everyday web browsers into remote-control tools using a new command-and-control (C2) platform called Matrix Push C2, according to BlackFog research. The browser‑native, fileless framework abuses legitimate web push notification features to deliver malware, phishing pages, and data theft campaigns across Windows, macOS, Linux, and mobile platforms. Instead of dropping traditional malware binaries…

Read More

Majority Indian Orgs plan to hire dedicated professionals for cyber security: Report

Wakefield Research conducted a survey among 1,625 IT security decision-makers at companies with 500 or more employees with a 50/50 split of directors/VPs and CIOs/CISOs. The report states that 90 %  of Indian organisations plan to hire dedicated professionals in the next 12 months to manage and enhance digital identity management, infrastructure and security, according…

Read More

Azure Network Hit by Record-Breaking 15 Tbps DDoS Attack From 500,000+ Devices

Microsoft Azure successfully repelled one of the most devastating distributed denial-of-service attacks in cloud computing history on October 24, 2025. The assault, which peaked at an unprecedented 15.72 terabits per second (Tbps), targeted a single endpoint in Australia and demonstrated both the escalating sophistication of modern cyber threats and the resilience of enterprise-grade cloud infrastructure….

Read More