Tag: india
-
Thousands of Indian bank transfer records found online
Security researchers found the exposed Indian bank transfer records and the data was eventually secured, but nobody wants to take responsibility for the security lapse. First seen on techcrunch.com Jump to article: techcrunch.com/2025/09/25/thousands-of-indian-bank-transfer-records-found-online/
-
India’s IT minister moves to Zoho’s spreadsheet and word processor, urges 1.4 billion people to do likewise
Watch out, Microsoft and Google First seen on theregister.com Jump to article: www.theregister.com/2025/09/24/indian_minister_zoho_local_tech_push/
-
Hackers reportedly steal pictures of 8,000 children from Kido nursery chain
Firm, which has 18 sites around London and more in US, India and China, has received ransom demand, say reportsThe names, pictures and addresses of about 8,000 children have reportedly been stolen from the Kido nursery chain by a gang of cybercriminals.The criminals have demanded a ransom from the company which has 18 sites around…
-
Hackers reportedly steal details of 8,000 children from Kido nursery chain
Firm, which has 18 sites around London and more in US, India and China, has received ransom demand, say reportsThe names, pictures and addresses of about 8,000 children have reportedly been stolen from the Kido nursery chain by a gang of cybercriminals.The criminals have demanded a ransom from the company which has 18 sites around…
-
Experts Warn of Global Breach Risk from Indian Suppliers
SecurityScorecard report finds 53% of Indian vendors suffered third-party breaches in the past year First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/experts-global-breach-risk-indian/
-
European airports continue to crawl after a cyberattack on Collins’ MUSE systems
Tags: access, breach, ceo, cyberattack, data, exploit, group, india, infrastructure, risk, service, threat, vulnerabilityShared infrastructure and systemic risk: Collins Aerospace’s MUSE platform serves many airports’ check-in and baggage drop systems, meaning a fault there ripples across multiple nations. Brussels, Heathrow, Berlin and Dublin all reported impacts. Frankfurt and Paris airports were relatively spared, showing that usage of the compromised system varies.”Although information is still limited, the disruption at…
-
Cybersecurity for Small Business: Protecting Growth in a High-Risk Landscape
Your small business is one of the estimated 350 to 450 million Micro, Small and Medium Enterprises (MSMEs) worldwide. There are 6.3+ crore enterprises in India alone. With SMBs being one of the easiest and the most preferred epicentre for the hackers ulterior motive, cybersecurity for small business should not be put forward as a……
-
Inside the Jaguar Land Rover hack: stalled smart factories, outsourced cybersecurity and supply chain woes
Being a carmaker where ‘everything is connected’ has left JLR unable to isolate its plants or functions, forcing a shutdown of most systemsThe first external signs of the chaos about to hit JLR, Britain’s largest automotive employer, came on the quiet last Sunday of August. Managers at a factory in Halewood, Merseyside, told industry contacts…
-
Hacktivists Launch Coordinated Attacks on India’s Infrastructure
The post Hacktivists Launch Coordinated Attacks on India’s Infrastructure appeared first on Daily CyberSecurity. First seen on securityonline.info Jump to article: securityonline.info/hacktivists-launch-coordinated-attacks-on-indias-infrastructure/
-
Top 10 Best Ransomware Protection Companies in 2025
As per a recent Sophos report from July 2025, 53% of Indian organizations impacted by ransomware paid the ransom, though the median payment saw a significant drop to around $481,636 (approximately ₹4 crore). However, the average recovery cost, excluding ransom, soared to $1.01 million (roughly ₹8.4 crore). These figures highlight that even if ransoms are…
-
2025 CSO Hall of Fame: Laura Deaner on AI, quantum threats, and cyber leadership
Tags: ai, attack, automation, breach, business, ciso, compliance, conference, cyber, cybersecurity, india, ml, ransomware, risk, skills, strategy, tactics, technology, threat, tool, vulnerabilityHow has the CISO role changed during your career, and what do you see as the biggest cybersecurity challenges for the next generation of CISOs?: Laura Deaner: “When the CISO role first emerged, security was treated as an IT compliance checkbox. Over the years, high-profile breaches”, such as the Code Red incident at Microsoft”, forced…
-
Jaguar Land Rover Hackers Stole Data
Operations Likely to Be Disrupted for Weeks. British carmaker Jaguar Land Rover on Wednesday said hackers stole some data in the cyberattack detected earlier this month. The Tata Motors-owned luxury carmaker shut down assembly lines in the United Kingdom, Slovakia, Brazil and India after a Sept. 1 cyberattack. First seen on govinfosecurity.com Jump to article:…
-
The Hidden Security Gaps in Digital Lending Applications
Here’s a wake up call for Financial Institutions like you! Digital lending applications (DLAs) have revolutionized how Indians borrow loans. It can be now approved in minutes via a smartphone. But behind this convenience lurk hidden security gaps that could put both users and financial institutions at risk. In this post, we’ll unpack these vulnerabilities,……
-
Kazakh oil giant denies cyberattack, says incident was ‘planned’ phishing drill
Indian cybersecurity researchers claimed Kazakhstan’s state-owned oil company had been hacked by a Russian-speaking operation. It was all just a pentest, though, the company said. First seen on therecord.media Jump to article: therecord.media/kazakstan-oil-company-kazmunaygas-phishing-simulation-not-cyberattack
-
Kazakh oil giant denies cyberattack, says incident was ‘planned’ phishing drill
Indian cybersecurity researchers claimed Kazakhstan’s state-owned oil company had been hacked by a Russian-speaking operation. It was all just a pentest, though, the company said. First seen on therecord.media Jump to article: therecord.media/kazakstan-oil-company-kazmunaygas-phishing-simulation-not-cyberattack
-
Kazakh oil giant denies cyberattack, says incident was ‘planned’ phishing drill
Indian cybersecurity researchers claimed Kazakhstan’s state-owned oil company had been hacked by a Russian-speaking operation. It was all just a pentest, though, the company said. First seen on therecord.media Jump to article: therecord.media/kazakstan-oil-company-kazmunaygas-phishing-simulation-not-cyberattack
-
Disruption to Jaguar Land Rover after cyber-attack may last until October
Thousands of workers told to stay home this week as car manufacturer deals with digital systems outageProduction at Jaguar Land Rover (JLR) and dozens of its suppliers is to remain on hold for at least this week, with disruption from a crippling cyber-attack at the carmaker expected to last until October.The UK’s biggest car manufacturer,…
-
Cryptohack Roundup: El Salvador Splits Bitcoin Reserve
Also: PowerShell-Based Cryptojacking Attack, a Malvertising Campaign. This week, El Salvador split its bitcoin reserve, an Indian court jailed cops for crypto kidnapping, a PowerShell-based cryptojacking attack, a malvertising campaign targeted Android users, a Venus Protocol hack, malware hid in npm packages using smart contracts for evasion and Bunni DEX exploit. First seen on govinfosecurity.com…
-
Android droppers evolved into versatile tools to spread malware
Android droppers now spread banking trojans, SMS stealers, and spyware, disguised as government or banking apps in India and Asia. ThreatFabric researchers warn of a shift in Android malware: dropper apps now deliver not just banking trojans, but also SMS stealers and spyware, mainly in Asia. Google’s Pilot Program enhances Play Protect by scanning Android…
-
OpenAI targets India with datacentre push
The AI firm is planning to open a one-gigawatt datacentre in India, which could reduce latency, ensure regulatory compliance and give it an edge over hyperscalers First seen on computerweekly.com Jump to article: www.computerweekly.com/news/366630088/OpenAI-targets-India-with-datacentre-push
-
TDL 002 – Defending the DNS: How Quad9 Protects the Internet with John Todd
Tags: access, apple, attack, business, china, ciso, communications, control, country, crime, cyber, cybersecurity, data, defense, dns, email, encryption, firewall, google, ibm, india, infrastructure, intelligence, Internet, jobs, law, malicious, malware, network, phishing, privacy, service, strategy, technology, threat, tool, zero-trustSummary The Defender’s Log episode features John Todd from Quad9, discussing their mission to protect the internet through secure DNS. Quad9, a non-profit launched in 2017 with founding partners Global Cyber Alliance, Packet Clearing House, and IBM, provides a free, global recursive DNS resolver that blocks malicious domains. Todd emphasizes that Quad9’s success is a…
-
Android Droppers Now Deliver SMS Stealers and Spyware, Not Just Banking Trojans
Cybersecurity researchers are calling attention to a new shift in the Android malware landscape where dropper apps, which are typically used to deliver banking trojans, to also distribute simpler malware such as SMS stealers and basic spyware.These campaigns are propagated via dropper apps masquerading as government or banking apps in India and other parts of…
-
SEBI Clarifies Scope of CSCRF, Recognizes RBI Oversight
The Securities and Exchange Board of India (SEBI) issued a clarification on Thursday regarding the scope and applicability of its Cybersecurity and Cyber Resilience Framework (CSCRF). According to the markets regulator, the framework applies strictly to systems used exclusively for SEBI-regulated activities, alleviating concerns around overlapping responsibilities with other regulatory bodies. First seen on thecyberexpress.com…
-
Transparent Tribe Deploys Malicious Files Against India Govt
Pakistan-Linked Threat Actor Targets Indian Linux Operation System. Pakistan-linked hackers are targeting an Indian Linux-based operating system by tricking government employees into clicking malicious files that look like PDFs. When opened, the files install spyware, giving attackers long-term access to sensitive government systems. First seen on govinfosecurity.com Jump to article: www.govinfosecurity.com/transparent-tribe-deploys-malicious-files-against-india-govt-a-29305
-
APT36 Targets Indian BOSS Linux Using Weaponized .desktop Shortcut Files
Researchers have unveiled ONEFLIP, a novel inference-time backdoor attack that compromises full-precision deep neural networks (DNNs) by flipping just one bit in the model’s weights, marking a significant escalation in the practicality of hardware-based attacks on AI systems. Unlike traditional backdoor methods that require poisoning training data or manipulating the training process, ONEFLIP operates during…
-
OneFlip Attack Backdoors AI Systems by Flipping a Single Bit in Neural Networks
CYFIRMA researchers have uncovered a campaign they have codenamed “OneFlip”, an operation that demonstrates how a single-bit modification inside a seemingly benign file can be enough to re-pivot a neural-network-driven security workflow and open a backdoor on the underlying host. Transparent Tribe (APT36) is leveraging the trick against India’s Government networks that rely on the…
-
OneFlip Attack Backdoors AI Systems by Flipping a Single Bit in Neural Networks
CYFIRMA researchers have uncovered a campaign they have codenamed “OneFlip”, an operation that demonstrates how a single-bit modification inside a seemingly benign file can be enough to re-pivot a neural-network-driven security workflow and open a backdoor on the underlying host. Transparent Tribe (APT36) is leveraging the trick against India’s Government networks that rely on the…
-
OneFlip Attack Backdoors AI Systems by Flipping a Single Bit in Neural Networks
CYFIRMA researchers have uncovered a campaign they have codenamed “OneFlip”, an operation that demonstrates how a single-bit modification inside a seemingly benign file can be enough to re-pivot a neural-network-driven security workflow and open a backdoor on the underlying host. Transparent Tribe (APT36) is leveraging the trick against India’s Government networks that rely on the…
-
Behind the Coinbase breach: Bribery emerges as enterprise threat
Coinbase’s widely praised incident response: Coinbase’s transparency, firm stance against the ransom, quick remediation, and willingness to compensate its customers earned wide praise from cybersecurity professionals.According to Coinbase’s Martin, the hackers resorted to paying help desk workers in India precisely because the company had built such a robust security program. Bribery, according to Martin, was…
-
Transparent Tribe Targets Indian Govt With Weaponized Desktop Shortcuts via Phishing
The advanced persistent threat (APT) actor known as Transparent Tribe has been observed targeting both Windows and BOSS (Bharat Operating System Solutions) Linux systems with malicious Desktop shortcut files in attacks targeting Indian Government entities.”Initial access is achieved through spear-phishing emails,” CYFIRMA said. “Linux BOSS environments are targeted via weaponized .desktop First seen on thehackernews.com…

