admin

Sophos State of Ransomware report Vulnerabilities Cause for Ransomware in 2025.

The sixth edition of the annual Sophos State of Ransomware report which reveals the reality of ransomware in 2025.This year’s report details how organizations’ experiences of ransomware— both cause and consequences — have evolved over the last 12 months. It also shines light into previously unexplored areas, including the operational factors that left organizations exposed…

Read More

OneClik: A ClickOnce-Based APT Campaign Targeting Energy, Oil & Gas Infrastructure

The Trellix Advanced Research Center has uncovered a sophisticated APT malware campaign that we’ve dubbed OneClik. It specifically targets the energy, oil, and gas sector through phishing attacks and the exploitation of Microsoft ClickOnce. The campaign exhibits characteristics aligned with Chinese-affiliated threat actors, though attribution remains cautious. Its methods reflect a broader shift toward “living off the land”…

Read More

5 Cybersecurity Startups Strengthening Digital Defenses Against Quantum Threats

Quantum computers are no longer just a futuristic concept—they’re becoming real, and with them comes a new kind of cybersecurity threat. Traditional encryption methods, which protect everything from financial data to national security systems, could be rendered obsolete by the sheer power of quantum computing. As this technological shift looms closer, the need for quantum-resilient…

Read More

Google launches Safety Charter to secure India’s AI future, flags online fraud & cyber threats

Google on Tuesday unveiled its Safety Charter at the “Safer with Google India Summit” in New Delhi, outlining a comprehensive strategy to tackle online scams, bolster cybersecurity, and promote responsible AI development. The initiative marks a significant step in Google’s effort to build a safer and more resilient digital ecosystem in India. The Safety Charter…

Read More

Visibility Top Priority for Org’s to manage Cyber Complexity & be Competitive: Vinay Sharma, Regional Director, India & SAARC, NETSCOUT

Visibility a top priority for Org’s to manage growing complexity & remain competitive: Vinay Sharma, Regional Director, India & SAARC, NETSCOUT In today’s time cyber adversaries are more resilient, take-down-resistant networks that makes tough for  detection to mitigation strategies for security teams. It is important that network operations teams insights to fine-tune their strategies to…

Read More

Cyber Security Exercise Launched by Armed forces, ‘CyberThis multi-phased exercise, which concludes on June 27, is a proactive step towards bolstering cyber resilience at national level, and encompasses the conduct of targeted training sessions, evaluation and an engaging capsule for leadership, it said.

The armed forces on Monday launched a 12-day cyber security exercise, called Cyber Suraksha, to simulate real-world threats and reinforce secure practices, the defence ministry said. The exercise is a proactive step towards bolstering cyber resilience at the national level, it said in a statement. The cyber domain is among the nine areas identified by…

Read More

Cybercrime is easy to commit & very hard, to stop,” said Dr. Eric Cole, a former CIA hacker, founder of cybersecurity consultancy Secure Anchor

Cybercrime is predicted to cost the world $10.5 trillion USD in 2025, according to Cybersecurity Ventures. If it were measured as a country, then cybercrime would be the world’s third largest economy after the U.S. and China. This represents the greatest transfer of economic wealth in history, risks the incentives for innovation and investment, is exponentially…

Read More

CISA Issues New Guidelines to Secure Network Edge Devices Against Cyber Threats

CISA have unveiled comprehensive guidance to help organizations safeguard their network edge devices from increasingly sophisticated cyber threats. The initiative, coordinated across multiple nations, addresses critical vulnerabilities in firewalls, routers, VPN gateways and operational technology systems that serve as primary entry points for malicious actors like IOT devices. The cybersecurity guidance represents an unprecedented collaboration…

Read More