NETSCOUT EXPANDS AUTOMATED THREAT DETECTION AND RESPONSE CAPABILITIES

NETSCOUT SYSTEMS, recently  announced Adaptive Threat Analytics, a new enhancement to its Omnis Cyber Intelligence Network Detection and Response (NDR) solution, designed to improve incident response and reduce risk. Adaptive Threat Analytics enables security teams to investigate, hunt, and respond to cyber threats more rapidly. Cybersecurity professionals face a challenge in the race against time…

Read More

Kaspersky’s business soars 24% in India last year, amid rising cybersecurity demand

Kaspersky, a global leader in cybersecurity and data privacy, demonstrated strong and consistent performance in the Indian market in 2024, achieving robust growth across both B2B and B2C segments. Overall, Kaspersky recorded a 24% year-over-year increase in total product sales in India for the year. The B2B segment grew by 20%, while the B2C segment…

Read More

Sophos State of Ransomware report Vulnerabilities Cause for Ransomware in 2025.

The sixth edition of the annual Sophos State of Ransomware report which reveals the reality of ransomware in 2025.This year’s report details how organizations’ experiences of ransomware— both cause and consequences — have evolved over the last 12 months. It also shines light into previously unexplored areas, including the operational factors that left organizations exposed…

Read More

OneClik: A ClickOnce-Based APT Campaign Targeting Energy, Oil & Gas Infrastructure

The Trellix Advanced Research Center has uncovered a sophisticated APT malware campaign that we’ve dubbed OneClik. It specifically targets the energy, oil, and gas sector through phishing attacks and the exploitation of Microsoft ClickOnce. The campaign exhibits characteristics aligned with Chinese-affiliated threat actors, though attribution remains cautious. Its methods reflect a broader shift toward “living off the land”…

Read More

Cyber warfare represents a new paradigm in Geo-Political conflict conflict

Cyber warfare has become a critical in geo p[oltical arena. Cyber tools are being used by states who seeking to exert influence, destabilize adversaries or  alter the outcomes of elections of rival nations. Countries such as the United States, Russia, China, Iran, North Korea, Israel, and others are now deeply involved in invisible cyber battles…

Read More

Visibility Top Priority for Org’s to manage Cyber Complexity & be Competitive: Vinay Sharma, Regional Director, India & SAARC, NETSCOUT

Visibility a top priority for Org’s to manage growing complexity & remain competitive: Vinay Sharma, Regional Director, India & SAARC, NETSCOUT In today’s time cyber adversaries are more resilient, take-down-resistant networks that makes tough for  detection to mitigation strategies for security teams. It is important that network operations teams insights to fine-tune their strategies to…

Read More

Cyber Security Exercise Launched by Armed forces, ‘CyberThis multi-phased exercise, which concludes on June 27, is a proactive step towards bolstering cyber resilience at national level, and encompasses the conduct of targeted training sessions, evaluation and an engaging capsule for leadership, it said.

The armed forces on Monday launched a 12-day cyber security exercise, called Cyber Suraksha, to simulate real-world threats and reinforce secure practices, the defence ministry said. The exercise is a proactive step towards bolstering cyber resilience at the national level, it said in a statement. The cyber domain is among the nine areas identified by…

Read More

Quantum Force Firewalls Bring Lightning-Fast Cyber Security to the Branch Office

Our hyperconnected world demands more from cyber security than ever before. Security leaders must prevent intrusions at the network level, but also protect a distributed, cloud-enabled workforce in hybrid roles and in branch offices with the same enterprise-grade security that protects a company’s headquarters.   A significant portion of work – and the workforce – resides…

Read More