Phone : +91 95 8290 7788 | Email : sales@itmonteur.net

Register & Request Quote | Submit Support Ticket

Home » 2025

Yearly Archives: 2025

Barracuda uncovers ‘Quishing’ attacks using split & nested QR codes, ETCISO

Barracuda uncovers ‘Quishing’ attacks using split & nested QR codes, ETCISO Barracuda threat analysts have uncovered two innovative techniques being used by cyber attackers to help malicious QR codes evade detection in phishing attacks. The techniques, detailed in a new threat report, involve splitting a malicious QR code in two to confuse traditional scanning systems, or nesting the malicious QR ...

Read More »

Orange SA hacked, user data leaked on dark web

Orange SA hacked, user data leaked on dark web https://etimg.etb2bimg.com/thumb/msid-123493684,imgsize-2604,width-1200,height=627,overlay-etciso,resizemode-75/data-breaches/orange-sa-hacked-user-data-released-on-dark-web-what-one-of-worlds-leading-telecom-companies-has-to-say.jpg Orange SA, one of the world’s leading telecom companies, has been hacked. According to a report, hackers have stolen and published about 4GB of sensitive business user data on the dark web. Orange first became aware of the breach in late July and reported it to national authorities. The data ...

Read More »

Pre-Auth Exploit Chains Found in Commvault Could Enable Remote Code Execution Attacks

Pre-Auth Exploit Chains Found in Commvault Could Enable Remote Code Execution Attacks https://firewall.firm.in/wp-content/uploads/2025/08/flaws.jpg Aug 21, 2025Ravie LakshmananVulnerability / Software Security Commvault has released updates to address four security gaps that could be exploited to achieve remote code execution on susceptible instances. The list of vulnerabilities, identified in Commvault versions before 11.36.60, is as follows – CVE-2025-57788 (CVSS score: 6.9) – ...

Read More »

Zscaler and CrowdStrike expand partnership to strengthen AI-driven security operations

Zscaler and CrowdStrike expand partnership to strengthen AI-driven security operations https://etimg.etb2bimg.com/thumb/msid-123424656,imgsize-9610,width-1200,height=627,overlay-etciso,resizemode-75/corporate/zscaler-and-crowdstrike-expand-partnership-to-strengthen-ai-driven-security-operations.jpg Zscaler, Inc., the leader in cloud security, today announced an expanded partnership between Red Canary, a Zscaler company, and strategic partner CrowdStrike to deliver enhanced protection across endpoints, users, and workloads. Together, Zscaler and Red Canary are delivering a seamless path forward for customers migrating from legacy endpoint products ...

Read More »

Insights from Aviva India’s CRO, ETCISO

Insights from Aviva India’s CRO, ETCISO In an era where AI is redefining efficiency and disruption, insurers face a paradox: the same technology promising exponential gains also carries opaque “black box” risks. Gartner predicts that by 2026, more than 80% of enterprises will adopt generative AI in production, yet fewer than half will implement effective risk controls. For Gaurav Banka, ...

Read More »

4 more Bengal poll officials face ECI ire over data safety breach

4 more Bengal poll officials face ECI ire over data safety breach https://etimg.etb2bimg.com/thumb/msid-123328889,imgsize-20710,width-1200,height=627,overlay-etciso,resizemode-75/data-breaches/4-more-bengal-poll-officials-face-eci-ire-over-data-safety-breach.jpg In West Bengal, the Election Commission of India (ECI), the chief electoral office and district magistrates are conducting regular checks to identify irregularities in the electoral rolls, people in the know told ET. The ECI is yet to begin the special intensive revision (SIR) of electoral rolls ...

Read More »

Researchers Uncover GPT-5 Jailbreak and Zero-Click AI Agent Attacks Exposing Cloud and IoT Systems

Researchers Uncover GPT-5 Jailbreak and Zero-Click AI Agent Attacks Exposing Cloud and IoT Systems https://firewall.firm.in/wp-content/uploads/2025/08/chatgpt-5-jailbreak.jpg Cybersecurity researchers have uncovered a jailbreak technique to bypass ethical guardrails erected by OpenAI in its latest large language model (LLM) GPT-5 and produce illicit instructions. Generative artificial intelligence (AI) security platform NeuralTrust said it combined a known technique called Echo Chamber with narrative-driven steering ...

Read More »

India a top APAC target in ransomware surge globally: Cyble H1 2025 report

India a top APAC target in ransomware surge globally: Cyble H1 2025 report https://etimg.etb2bimg.com/thumb/msid-123164729,imgsize-5030,width-1200,height=627,overlay-etciso,resizemode-75/cybercrime-fraud/india-a-top-apac-target-in-ransomware-surge-globally-cyble-h1-2025-report.jpg Cyble, the global leader in threat intelligence and cybercrime monitoring, has released its Global Threat Landscape Report: H1 2025, revealing a sharp rise in ransomware and supply chain attacks across the world—with India emerging as one of the most targeted nations in the APAC region. According ...

Read More »

India Emerges as Third Most Targeted Nation by Ransomware Attacks in APAC, ETCISO

India Emerges as Third Most Targeted Nation by Ransomware Attacks in APAC, ETCISO India has emerged as one of the top three targets for ransomware attacks in the Asia-Pacific (APAC) region, according to the Global Threat Landscape Report: H1 2025 by Cyble, a US based cyber threat intelligence and monitoring startup. The report reveals a surge in ransomware and supply ...

Read More »

Cisco suffers data breach: How hackers used ‘voice attack’ to steal user information

Cisco suffers data breach: How hackers used ‘voice attack’ to steal user information https://etimg.etb2bimg.com/thumb/msid-123132098,imgsize-43940,width-1200,height=627,overlay-etciso,resizemode-75/data-breaches/cisco-suffers-data-breach-how-hackers-used-voice-attack-to-steal-user-information.jpg Cisco has disclosed a recent data breach, revealing that a cybercriminal successfully tricked a company representative into granting access to a third-party database. The attack, identified as a voice phishing or “vishing” scheme, led to the theft of basic profile information for users registered on Cisco.com. ...

Read More »

Information Security - InfoSec - Cyber Security - Firewall Providers Company in India

 

 

 

 

 

 

 

 

 

 

 

 

What is Firewall? A Firewall is a network security device that monitors and filters incoming and outgoing network traffic based on an organization's previously established security policies. At its most basic, a firewall is essentially the barrier that sits between a private internal network and the public Internet.

 

Secure your network at the gateway against threats such as intrusions, Viruses, Spyware, Worms, Trojans, Adware, Keyloggers, Malicious Mobile Code (MMC), and other dangerous applications for total protection in a convenient, affordable subscription-based service. Modern threats like web-based malware attacks, targeted attacks, application-layer attacks, and more have had a significantly negative effect on the threat landscape. In fact, more than 80% of all new malware and intrusion attempts are exploiting weaknesses in applications, as opposed to weaknesses in networking components and services. Stateful firewalls with simple packet filtering capabilities were efficient blocking unwanted applications as most applications met the port-protocol expectations. Administrators could promptly prevent an unsafe application from being accessed by users by blocking the associated ports and protocols.

 

Firewall Firm is an IT Monteur Firewall Company provides Managed Firewall Support, Firewall providers , Firewall Security Service Provider, Network Security Services, Firewall Solutions India , New Delhi - India's capital territory , Mumbai - Bombay , Kolkata - Calcutta , Chennai - Madras , Bangaluru - Bangalore , Bhubaneswar, Ahmedabad, Hyderabad, Pune, Surat, Jaipur, Firewall Service Providers in India

Sales Number : +91 95 8290 7788 | Support Number : +91 94 8585 7788
Sales Email : sales@itmonteur.net | Support Email : support@itmonteur.net

Register & Request Quote | Submit Support Ticket