Role of ‘Wazuh’ in Governance of Organizational Cyber secure Framework

Open Source Software (OSS) “Wazuh” Cyber security architecture refers to the design and framework governing an organization’s approach to securing information systems. It outlines the components, policies, technologies, and processes to protect digital assets. The primary objective of a cyber security architecture is to establish a robust, resilient, and well-integrated defense against a wide range…

Read More

The Dual Role AI Plays in Cybersecurity: Road Map to Stay Ahead

AI-enabled solutions available for various business use cases, and organizations are increasingly recognizing their value. According to a survey, 33% of organizations are currently leveraging generative AI in at least one business function. Furthermore, it’s projected that by 2026, more than 80% of enterprises will have their own generative AI APIs and models in operation. The adoption of…

Read More

Alkem Labs Reports Cyber Breach &’Fraudulent Transfer’ Loss of 52 Cr

Alkem Laboratories confirmed a cybersecurity incident that led to a fraudulent transfer of Rs 52 crore from one of its subsidiaries affecting the brand value and reveling serious vulnerabilities at several level. The disclosure raises concerns about vulnerabilities in India’s pharmaceutical sector to cyberattacks and led to price fall in their share prices. Alkem stated…

Read More

Triveni Singh Joins PWC India, as a part of their Cyber crime Team

Triveni Singh, a 2011 batch state cadre IPS officer who is known as the ‘cybercop’, held the position of superintendent of police (SP) cybercrime since August 2020, retired from his services. He retired at least two years before his scheduled superannuation in November 2025. Initially appointed as a provincial police services (PPS) officer in 1994,…

Read More

Zscaler ThreatLabz Finds Most Cyberattacks Hide In Encrypted Traffic

Zscaler finds malware, which includes malicious web content and malware payloads, continued to dominate over other types of encrypted attacks, with ad spyware sites and cross-site scripting accounting for 78% of all blocked attacks. Research analyzed nearly 30 billion blocked threats from October 2022 to September 2023 by the Zscaler Zero Trust Exchange platform, the…

Read More

Escrow Accounts of a Company Hacked,25 crores Siphoned off by Cybercriminals

Hackers infiltrated into escrow bank accounts of a Thane based company, posing as bank executive In a major cybercrime incident that has sent shockwaves through the city, unidentified hackers successfully infiltrated the escrow bank account of a Thane-based company, resulting in a staggering loss of approximately Rs 25 crore. Escrow accounts are majorly held by…

Read More

Threatcop Launches Cybersecurity Guide as First Line of Defense

Threatcop, a pioneer in people security management category with an exclusive AAPE framework, has  announced the launch of its ground breaking cybersecurity guide, “People Security,” at the prestigious Annual Information Security Service (AISS) 2023 event organized by DSCI. This innovative guide is a testament to Threatcop’s commitment to its People Security Management (PSM) category which…

Read More

Cyber Risk Agenda Tops List in Telecomm Bill 2023, Passed in Loksabha

Telecommunications Bill, 2023, tabled in the Lok Sabha by communications minister Ashwini Vaishnaw The Telco sector is an industry undergoing significant change. We have seen how these organizations have shifted from traditional business models, as carriers of voice and data connectivity, to enablers of sophisticated technology. CISOs are being provided broader responsibility and accountability to…

Read More

AI Powered Security Solutions are an Obvious Future; Sai Venkataraman, CEO & Co- Founder, Discern Security,

AI Powered security solutions are an obvious future. AI powered policy management platform is one solution, determined to capture a large market globally, with its unique features. To understand this AI powered security solution, Securitydive delved deeper and spoke to Mr. Sai Venkataraman, CEO & Co-Founder, Discern Security, in length & breadth. Here is the…

Read More

Researcher Discover Vulnerability in the Bluetooth Protocol Across OS

Kaspersky researchers discovered a severe vulnerability in the implementations of the Bluetooth protocol across several popular operating systems: Android, macOS, iOS, iPadOS, and Linux. This bug potentially allows remote hacking of vulnerable devices without any particular actions required on the part the user. Let’s dive into the details. As per reserachers the Bluetooth vulnerability allows you…

Read More