Securonix is transforming SecOps with Agentic AI through intelligent agents; Dipesh kaura, Securonix

Recently Securitydive spoke to Dipesh Kaura serves as the Country Director for India & SAARC at Securonix. As threat landscape expand so are offerings to secure enterprise. With AI poised as an integral part of cyber threats, organizations have shifted their investments following this trend, with a focus on AI-based defenses against cyberattacks. The demand…

Read More

UAE Cyber Security Council warns 1.4 billion accounts hacked monthly worldwide

The UAE Cybersecurity Council has warned the public against the dangers of neglecting personal digital footprints, cautioning that every login, post, or interaction online leaves behind a trail that can be exploited by hackers or untrustworthy applications. In a statement carried by the Emirates News Agency (WAM), the council noted that more than 1.4 billion…

Read More

FBI Unveils IOCs for Cyber Attacks Targeting Salesforce Instances for Data Exfiltration

The Federal Bureau of Investigation (FBI) has released a flash alert detailing the activities of two cybercriminal groups, UNC6040 & UNC6395, that are actively compromising Salesforce environments to steal data for extortion purposes. The advisory, published by the FBI on September 12, 2025, provides indicators of compromise (IOCs) and defensive measures to help organizations protect…

Read More

Cyber attackers use images & built-in tools to bypass defences

Research from HP Wolf Security has found that cyber attackers are continually refining established tactics in order to evade security measures and deceive users. Living-off-the-land tactics The HP Threat Insights Report describes an increasing trend in the use of “living-off-the-land” (LOTL) techniques, whereby cybercriminals utilise legitimate tools and features within the operating system to carry…

Read More

Cognizant Appoints Vishal Salvi as Global Head of Cyber Security

Cognizant has been  appointed Vishal Salvi as the Global Head of Cyber Security Service-Line. This is  a strategic move to reinforce its cybersecurity leadership and he will now drive global initiatives to strengthen enterprise security and resilience. Vishal is a well-known global leader and he comes with extensive management and domain experience in driving transformation and cybersecurity…

Read More

Security by design starts at the whiteboard stage: Srinivas Shekar, CEO, Pantherun Technologies

Pantherun Technologies was founded by Srinivas Shekar (CEO) and Tiffany Chan (COO). It was officially launched on 25th September 2019 and is headquartered out of Bangalore, with offices in Germany, Taiwan and the United States. Security by design starts at the whiteboard stage & security needs to be part of the first conversation: What sets…

Read More

NIST Finalizes ‘Lightweight Cryptography’ Standard To Protect Internet of Things (IoT) Devices

The National Institute of Standards and Technology (NIST) has finalized four lightweight cryptographic algorithms designed to safeguard data generated and transmitted by the Internet of Things (IoT) and other small-scale technologies. Unlike larger computers, many connected devices—such as smart home systems, fitness trackers, and other IoT applications—lack the processing power and memory to run conventional…

Read More

Rise in Deepfake AI Trading Scams Target Global Investors

The growing popularity and complexity of AI is being used to lure investors into scams. Look out for these red flags to help keep your money safe: Unregistered/Unlicensed Investment Platforms Claiming to Use AI Investors should remember that federal and state securities laws generally require securities firms, professionals, exchanges, and other investment platforms to be…

Read More

Financial impact from severe OT related threats rise to $300B

$330 Billion OT Cyber Risk impacting business at large OT networks under active attack due to critical RCE flaw Attackers are exploiting a critical remote code execution (RCE) vulnerability in the Erlang programming language’s Open Telecom Platform, widely used in OT networks and critical infrastructure. The flaw enables unauthenticated users to execute commands through SSH…

Read More