India’s Cyber Risk Profile Intensifies with AI-Driven Threats; Trend Micro Cyber Risk Report 2025

India ranks 2 nd globally in email threats, contributing 6.9% to global detections and nearly 24% to Asia’s total India holds 3 rd place globally in malware detections, responsible for 4.74% of all global threats Banking, Financial Services, and Government sectors remain the most targeted in India   Trend Micro Incorporated (TYO: 4704; TSE: 4704),…

Read More

Kettering Health Confirms, Interlock Ransomware Breached Systems to Stole Data

Kettering Health, a prominent healthcare network, has confirmed that its systems were compromised by the notorious Interlock ransomware group on May 20, 2025, in what marks another significant cyberattack targeting critical healthcare infrastructure. The healthcare provider disclosed the breach in an official statement released on June 5, 2025, outlining comprehensive remediation efforts and ongoing recovery operations following…

Read More

uropean cyber threat landscape continues to evolve, presenting new challenges that require stronger partnerships and enhanced solutions. Ransomware groups and state-sponsored actors from Russia, China, Iran, and North Korea continue to grow in scope and sophistication, and European cyber protection cannot afford to stand still. That is why, today, in Berlin, we are announcing a…

Read More

State of Cybersecurity Report 2025″, ‘AI driven Automation Priority for Cyber Security Leaders’

Cybersecurity leaders are increasingly turning to AI to navigate mounting cost pressures and the escalating sophistication of cyber threats, a recent report by Wipro has shown. Nearly one-third of global cybersecurity leaders now rank investment in AI-driven automation as their top priority for both bolstering security operations and reducing costs, according to Wipro’s “State of…

Read More

Kaspersky Warns APAC of Rising AI-Powered Cyber Threats

Global cybersecurity firm Kaspersky has issued an urgent call for Asia-Pacific (APAC) organizations to bolster their cyber defenses as artificial intelligence becomes a key weapon in the hands of cybercriminals. At its Cyber Insights 2025 forum in Seoul, Kaspersky revealed that cyber threats are not only growing in volume but also evolving in complexity due…

Read More

Hackers Target prime installation in India Post Pahalgam; Targets Govt Entity

The cyber space witnessed what looked like an intense battle between hacktivists supporting India according to a cyber threat intelligence report prepared by Kochi-based cybersecurity company Technisanct. According to a cyber threat intelligence report prepared by Kochi-based cybersecurity company Technisanct, India had to deal with a sustained cyber offensive targeting various institutions. These are mostly…

Read More

Banking passwords stolen from Australians are being traded online by cybercriminals

More than 31,000 passwords belonging to Australian customers of the Big Four banks are being shared amongst cyber criminals online, often for free, the ABC can reveal. Despite the anti-fraud protections in place at those banks, cybersecurity experts warn victims could “definitely” lose money as a result. An investigation by cyber intelligence researchers has shown…

Read More

Outdated Network Devices are reasons for Cyberattacks; Sophos Report

Sophos released its Annual Threat Report 2025: Cybercrime on Main Street, which sheds light on the biggest security threats small and medium-sized businesses faced in 2024, including ransomware as biggest threat. Compromised network edge devices—firewalls, virtual private network appliances, and other access devices—account for a quarter of the initial compromises of businesses in cases that…

Read More

56% of Cyberattacks Bypass Security With Legitimate Logins – Report

Newly released 2025 Sophos Active Adversary Report revealed,50 % cyberattacks in 2024 bypassed traditional security defenses by using legitimate login credentials. The report, which analysed over 400 cases of Managed Detection and Response (MDR) and Incident Response (IR), revealed that 56 percent of cyberattacks were executed by adversaries simply logging in rather than breaking in….

Read More