Barracuda uncovers ‘Quishing’ attacks using split & nested QR codes, ETCISO Barracuda threat analysts have uncovered two innovative techniques being used by cyber attackers to help malicious QR codes evade detection in phishing attacks. The techniques, detailed in a new threat report, involve splitting a malicious QR code in two to confuse traditional scanning systems, or nesting the malicious QR ...
Read More »Yearly Archives: 2025
Orange SA hacked, user data leaked on dark web
Orange SA hacked, user data leaked on dark web https://etimg.etb2bimg.com/thumb/msid-123493684,imgsize-2604,width-1200,height=627,overlay-etciso,resizemode-75/data-breaches/orange-sa-hacked-user-data-released-on-dark-web-what-one-of-worlds-leading-telecom-companies-has-to-say.jpg Orange SA, one of the world’s leading telecom companies, has been hacked. According to a report, hackers have stolen and published about 4GB of sensitive business user data on the dark web. Orange first became aware of the breach in late July and reported it to national authorities. The data ...
Read More »Pre-Auth Exploit Chains Found in Commvault Could Enable Remote Code Execution Attacks
Pre-Auth Exploit Chains Found in Commvault Could Enable Remote Code Execution Attacks https://firewall.firm.in/wp-content/uploads/2025/08/flaws.jpg Aug 21, 2025Ravie LakshmananVulnerability / Software Security Commvault has released updates to address four security gaps that could be exploited to achieve remote code execution on susceptible instances. The list of vulnerabilities, identified in Commvault versions before 11.36.60, is as follows – CVE-2025-57788 (CVSS score: 6.9) – ...
Read More »Zscaler and CrowdStrike expand partnership to strengthen AI-driven security operations
Zscaler and CrowdStrike expand partnership to strengthen AI-driven security operations https://etimg.etb2bimg.com/thumb/msid-123424656,imgsize-9610,width-1200,height=627,overlay-etciso,resizemode-75/corporate/zscaler-and-crowdstrike-expand-partnership-to-strengthen-ai-driven-security-operations.jpg Zscaler, Inc., the leader in cloud security, today announced an expanded partnership between Red Canary, a Zscaler company, and strategic partner CrowdStrike to deliver enhanced protection across endpoints, users, and workloads. Together, Zscaler and Red Canary are delivering a seamless path forward for customers migrating from legacy endpoint products ...
Read More »Insights from Aviva India’s CRO, ETCISO
Insights from Aviva India’s CRO, ETCISO In an era where AI is redefining efficiency and disruption, insurers face a paradox: the same technology promising exponential gains also carries opaque “black box” risks. Gartner predicts that by 2026, more than 80% of enterprises will adopt generative AI in production, yet fewer than half will implement effective risk controls. For Gaurav Banka, ...
Read More »4 more Bengal poll officials face ECI ire over data safety breach
4 more Bengal poll officials face ECI ire over data safety breach https://etimg.etb2bimg.com/thumb/msid-123328889,imgsize-20710,width-1200,height=627,overlay-etciso,resizemode-75/data-breaches/4-more-bengal-poll-officials-face-eci-ire-over-data-safety-breach.jpg In West Bengal, the Election Commission of India (ECI), the chief electoral office and district magistrates are conducting regular checks to identify irregularities in the electoral rolls, people in the know told ET. The ECI is yet to begin the special intensive revision (SIR) of electoral rolls ...
Read More »Researchers Uncover GPT-5 Jailbreak and Zero-Click AI Agent Attacks Exposing Cloud and IoT Systems
Researchers Uncover GPT-5 Jailbreak and Zero-Click AI Agent Attacks Exposing Cloud and IoT Systems https://firewall.firm.in/wp-content/uploads/2025/08/chatgpt-5-jailbreak.jpg Cybersecurity researchers have uncovered a jailbreak technique to bypass ethical guardrails erected by OpenAI in its latest large language model (LLM) GPT-5 and produce illicit instructions. Generative artificial intelligence (AI) security platform NeuralTrust said it combined a known technique called Echo Chamber with narrative-driven steering ...
Read More »India a top APAC target in ransomware surge globally: Cyble H1 2025 report
India a top APAC target in ransomware surge globally: Cyble H1 2025 report https://etimg.etb2bimg.com/thumb/msid-123164729,imgsize-5030,width-1200,height=627,overlay-etciso,resizemode-75/cybercrime-fraud/india-a-top-apac-target-in-ransomware-surge-globally-cyble-h1-2025-report.jpg Cyble, the global leader in threat intelligence and cybercrime monitoring, has released its Global Threat Landscape Report: H1 2025, revealing a sharp rise in ransomware and supply chain attacks across the world—with India emerging as one of the most targeted nations in the APAC region. According ...
Read More »India Emerges as Third Most Targeted Nation by Ransomware Attacks in APAC, ETCISO
India Emerges as Third Most Targeted Nation by Ransomware Attacks in APAC, ETCISO India has emerged as one of the top three targets for ransomware attacks in the Asia-Pacific (APAC) region, according to the Global Threat Landscape Report: H1 2025 by Cyble, a US based cyber threat intelligence and monitoring startup. The report reveals a surge in ransomware and supply ...
Read More »Cisco suffers data breach: How hackers used ‘voice attack’ to steal user information
Cisco suffers data breach: How hackers used ‘voice attack’ to steal user information https://etimg.etb2bimg.com/thumb/msid-123132098,imgsize-43940,width-1200,height=627,overlay-etciso,resizemode-75/data-breaches/cisco-suffers-data-breach-how-hackers-used-voice-attack-to-steal-user-information.jpg Cisco has disclosed a recent data breach, revealing that a cybercriminal successfully tricked a company representative into granting access to a third-party database. The attack, identified as a voice phishing or “vishing” scheme, led to the theft of basic profile information for users registered on Cisco.com. ...
Read More »
Firewall Security Company India Complete Firewall Security Solutions Provider Company in India











