CISA, Security and Intel Agencies Warn of Pro-Iranian Cyber Threats Targeting Critical Infrastructure

Hot on the heels of the U.S. bombing of Iranian nuclear facilities, a joint cybersecurity advisory has warned critical infrastructure organizations of cyber threats stemming from Iranian-backed malicious actors. “Over the past several months, there has been increasing activity from hacktivists and Iranian government-affiliated actors, which is expected to escalate due to recent events,” it stated….

Read More

Hexaware & Abluva Partner to Deliver Secure Agentic AI Solutions for the Life Sciences Industry

Hexaware Technologies, a global provider of IT services and solutions, today announced a strategic partnership with Abluva, an innovator in agentic AI security, to address security challenges posed by autonomous AI agents in the Life Sciences industry. This collaboration brings together Hexaware’s deep domain expertise and Abluva’s groundbreaking Secure Intelligence Plane to help organizations in…

Read More

Accenture & Microsoft Expand Collaboration on Gen-AI Powered Cyber Solutions

Accenture (NYSE: ACN) and Microsoft Corporation (NASDAQ: MSFT) are co-investing in the development of advanced generative AI-driven cyber solutions to help organizations mitigate threats and consolidate technology tools while optimizing operational costs. According to Accenture’s State of Cyber Resilience 2025 report, the majority (90%) of organizations are not ready to protect against AI-augmented cyber threats. By…

Read More

Kaspersky uncovers $500K Crypto Heist through Malicious packages Targeting Cursor users

Kaspersky GReAT (Global Research and Analysis Team) experts have discovered open-source packages that download the Quasar backdoor and a stealer designed to exfiltrate cryptocurrency. The malicious packages are intended for the Cursor development environment, which is based on Visual Studio Code — a tool used for AI-assisted coding. The malicious open-source packages are extensions hosted…

Read More

New Cyber Security Rules to Curb Phone Fraud

DoT proposes changes in cyber security rules to curb fraudulent activities using mobile phone numbers, introducing a new number validation platform and charges for validation requests. Department of Telecom has proposed changes in cyber security rules to curb fraudulent activities that are carried out using mobile phone numbers. The draft cyber security rules published on…

Read More

F5 introduces post-quantum cryptography tools for application security

Application security firm F5 Inc. today announced a series of new post-quantum cryptography readiness solutions as part of its Application Delivery and Security Platform to help organizations prepare for the cybersecurity threats posed by quantum computing. F5’s new PQC solutions are designed to safeguard sensitive data and maintain performance across hybrid, multicloud and legacy environments at a…

Read More

85% of Tech firms store sensitive Data in the Cloud, 8% encrypt it properly

64% of organizations ranked cloud security among their top five concerns, and 17%  identified it as their number one priority. These numbers make cloud security one of the most urgent cybersecurity issue of 2025 The 2025 Thales Global Cloud Security Study reveals that although cloud security is widely acknowledged as the most urgent cybersecurity challenge,…

Read More