F5 introduces post-quantum cryptography tools for application security

Application security firm F5 Inc. today announced a series of new post-quantum cryptography readiness solutions as part of its Application Delivery and Security Platform to help organizations prepare for the cybersecurity threats posed by quantum computing. F5’s new PQC solutions are designed to safeguard sensitive data and maintain performance across hybrid, multicloud and legacy environments at a…

Read More

85% of Tech firms store sensitive Data in the Cloud, 8% encrypt it properly

64% of organizations ranked cloud security among their top five concerns, and 17%  identified it as their number one priority. These numbers make cloud security one of the most urgent cybersecurity issue of 2025 The 2025 Thales Global Cloud Security Study reveals that although cloud security is widely acknowledged as the most urgent cybersecurity challenge,…

Read More

Kaspersky’s business soars 24% in India last year, amid rising cybersecurity demand

Kaspersky, a global leader in cybersecurity and data privacy, demonstrated strong and consistent performance in the Indian market in 2024, achieving robust growth across both B2B and B2C segments. Overall, Kaspersky recorded a 24% year-over-year increase in total product sales in India for the year. The B2B segment grew by 20%, while the B2C segment…

Read More

Sophos State of Ransomware report Vulnerabilities Cause for Ransomware in 2025.

The sixth edition of the annual Sophos State of Ransomware report which reveals the reality of ransomware in 2025.This year’s report details how organizations’ experiences of ransomware— both cause and consequences — have evolved over the last 12 months. It also shines light into previously unexplored areas, including the operational factors that left organizations exposed…

Read More

OneClik: A ClickOnce-Based APT Campaign Targeting Energy, Oil & Gas Infrastructure

The Trellix Advanced Research Center has uncovered a sophisticated APT malware campaign that we’ve dubbed OneClik. It specifically targets the energy, oil, and gas sector through phishing attacks and the exploitation of Microsoft ClickOnce. The campaign exhibits characteristics aligned with Chinese-affiliated threat actors, though attribution remains cautious. Its methods reflect a broader shift toward “living off the land”…

Read More

5 Cybersecurity Startups Strengthening Digital Defenses Against Quantum Threats

Quantum computers are no longer just a futuristic concept—they’re becoming real, and with them comes a new kind of cybersecurity threat. Traditional encryption methods, which protect everything from financial data to national security systems, could be rendered obsolete by the sheer power of quantum computing. As this technological shift looms closer, the need for quantum-resilient…

Read More

Cyber warfare represents a new paradigm in Geo-Political conflict conflict

Cyber warfare has become a critical in geo p[oltical arena. Cyber tools are being used by states who seeking to exert influence, destabilize adversaries or  alter the outcomes of elections of rival nations. Countries such as the United States, Russia, China, Iran, North Korea, Israel, and others are now deeply involved in invisible cyber battles…

Read More