AI Powered Automation Central Theme for Financial Cybersecurity: Chetan Jain, Inspira

Inspira Enterprise, a global cybersecurity leader, warns that it’s time for financial institutions to rethink their cybersecurity approach — shifting from reactive defense to AI-led, predictive, and zero-trust frameworks. SecurityDive spoke to Chetan Jain of Inspira to understand the theme Securitydive.in  Why AI and automation are becoming central to financial cybersecurity? Chetan Jain : AI and automation are…

Read More

Autonomous AI agents to close cyber skills gap: Palo Alto

Palo Alto Networks has released “6 Predictions for the AI Economy: 2026’s New Rules of Cybersecurity,” forecasting a transformative leap to the AI economy. This new AI-native global economic model, where AI drives productivity and operations, also introduces a seismic shift in risk. In 2026, autonomous AI agents will fundamentally redefine enterprise operations, setting the…

Read More

India logged 265 million cyber attacks in a year, Reports Seqrite 2026

Seqrite released its India Cyber Threat Report 2026, outlining one of the most active cyber threat periods observed in the country. The report, developed by Seqrite Labs, which monitors more than 8 million endpoints, provides an assessment of threat activity between October 2024 and September 2025. During this period, Seqrite recorded 265.52 million detections, averaging…

Read More

Researchers Uncover 30+ Flaws in AI Coding Tools Enabling Data Theft & RCE Attacks

Over 30 security vulnerabilities have been disclosed in various artificial intelligence (AI)-powered Integrated Development Environments (IDEs) that combine prompt injection primitives with legitimate features to achieve data exfiltration and remote code execution. The security shortcomings have been collectively named IDEsaster by security researcher Ari Marzouk (MaccariTA). They affect popular IDEs and extensions such as Cursor, Windsurf, Kiro.dev, GitHub Copilot,…

Read More

React2Shell: In-the-Wild Exploitation Expected for Critical React Vulnerability

The cybersecurity industry is on high alert following the disclosure of a critical React vulnerability that can be exploited by a remote, unauthenticated attacker for remote code execution.  React (React.js) is an open source JavaScript library designed for creating application user interfaces. Maintained by Meta and a large community of companies and individual developers from…

Read More

Securonix and Orient Technologies Announce Strategic Partnership to Deliver Advanced AI-powered SIEM Capabilities Across India

Securonix and Orient Technologies Announce Strategic Partnership to Deliver Advanced AI-powered SIEM Capabilities Across India Securonix announced a strategic partnership with Orient Technologies,  to address the rapidly evolving digital threat landscape by driving impactful innovation in cybersecurity with Unified Defense SIEM powered by Agentic AI for the modern Security Operations Centre (SOC) experiences to customers across…

Read More

Shai-hulud 2.0 Variant Threatens Cloud Ecosystem

The Shai-hulud self-replicating worm’s dangerous new variant is burrowing into new territories in its latest attack, flaunting features that threaten not only the npm code repository, but also GitHub and the cloud ecosystem — and to boot, it features new wiper functionality. Researchers from Trend Micro have revealed advanced capabilities of Shai-hulud 2.0, a variant…

Read More

Black Hat MEA: Saudi Vision 2030 fuels surge in cyber security innovation

At Black Hat MEA in Riyadh, the Kingdom of Saudi Arabia’s rapid digital transformation took centre stage, with mega-projects under Saudi Vision 2030 among the most advanced developments globally. For international cyber security companies, the opportunity is immense, yet navigating the Saudi market requires more than cutting-edge technology. It demands long-term trust, local engagement and…

Read More

DOT Mandate aimed at Curbing, Cyber frauds

The Union ministry of communications has said that the department of telecommunications’ (DoT) directions for the pre-installation of the Sanchar Saathi app in mobile handsets are aimed at safeguarding citizens from purchasing non-genuine handsets, enabling easy reporting of suspected misuse of telecom resources. “Failure to comply with these directions shall attract action under the Telecommunications…

Read More

Hyundai Motor launches 1st group-level dedicated cyberthreat team

Hyundai Motor Group has established a dedicated unit to respond to cyber threats and is sharply increasing its investment in information security as it accelerates efforts to strengthen protection across the group. The cyberthreat response team, led by Yang Ki-chang, head of the group’s Integrated Security Center, will oversee vulnerability assessments, threat monitoring and incident…

Read More