AI Slashes Workloads for vCISOs by 68% as SMBs Demand More – New Report Reveals https://firewall.firm.in/wp-content/uploads/2025/08/vciso.jpg Aug 06, 2025The Hacker NewsCompliance / Security Operations As the volume and sophistication of cyber threats and risks grow, cybersecurity has become mission-critical for businesses of all sizes. To address this shift, SMBs have been urgently turning to vCISO services to keep up with ...
Read More »Yearly Archives: 2025
Cofounder of $32B Google acquisition warns: ‘AI can help you code and hackers too
Cofounder of $32B Google acquisition warns: ‘AI can help you code and hackers too https://etimg.etb2bimg.com/thumb/msid-123132135,imgsize-35590,width-1200,height=627,overlay-etciso,resizemode-75/cybercrime-fraud/cofounder-of-32b-google-acquisition-warns-ai-can-help-you-code-and-hackers-too.jpg As artificial intelligence transforms software development into lightning-fast “vibe coding,” cybersecurity must evolve to match developers’ accelerated pace, according to Wiz cofounder and CTO Ami Luttwak. The Israeli-American cloud security firm, Google’s $32 billion acquisition target, is adapting its approach as AI enables developers to ...
Read More »Adversaries weaponize and target AI at scale, ETCISO
Adversaries weaponize and target AI at scale, ETCISO CrowdStrike today released the 2025 Threat Hunting Report, highlighting a new phase in modern cyberattacks: adversaries are weaponizing GenAI to scale operations and accelerate attacks – and increasingly targeting the autonomous AI agents reshaping enterprise operations. The report reveals how threat actors are targeting tools used to build AI agents – gaining ...
Read More »Breach in cyber security disrupts NCLT hearing
Breach in cyber security disrupts NCLT hearing https://etimg.etb2bimg.com/thumb/msid-123092859,imgsize-100919,width-1200,height=627,overlay-etciso,resizemode-75/data-breaches/breach-in-cyber-security-disrupts-nclt-hearing.jpg Kolkata: The National Company Law Tribunal (NCLT) Kolkata bench experienced a cyber security breach during an online court proceeding when an unknown perpetrator displayed inappropriate content around 2.52 pm on July 30. The unauthorized screen sharing, which lasted for three to four minutes, disrupted the court session presided over by tribunal members. ...
Read More »NVIDIA Triton Bugs Let Unauthenticated Attackers Execute Code and Hijack AI Servers
NVIDIA Triton Bugs Let Unauthenticated Attackers Execute Code and Hijack AI Servers https://firewall.firm.in/wp-content/uploads/2025/08/wiz-ai.jpg Aug 04, 2025Ravie LakshmananAI Security / Vulnerability A newly disclosed set of security flaws in NVIDIA’s Triton Inference Server for Windows and Linux, an open-source platform for running artificial intelligence (AI) models at scale, could be exploited to take over susceptible servers. “When chained together, these flaws ...
Read More »Israeli cyber startup Noma security raises $100 million in private funding round
Israeli cyber startup Noma security raises $100 million in private funding round https://etimg.etb2bimg.com/thumb/msid-123034392,imgsize-52778,width-1200,height=627,overlay-etciso,resizemode-75/cybercrime-fraud/israeli-cyber-startup-noma-security-raises-100-million-in-private-funding-round.jpg Israeli cybersecurity startup Noma Security, whose platform secures enterprise data and AI models against AI agents, said on Thursday it raised $100 million in a private funding round, bringing total funds raised to date to $132 million. Israel’s cyber security sector has been active of late and ...
Read More »Securing India’s digital rise in an age of cyberwarfare, ETCISO
Securing India’s digital rise in an age of cyberwarfare, ETCISO In the vast landscape of India’s digital journey, where innovations like UPI, Aadhaar, ONDC, and AI-powered infrastructures have become the pillars of progress, the country is also witnessing a rising tide of sophisticated cyber threats. As the nation accelerates towards its digital transformation, there is an urgent need to not ...
Read More »Tea app takes messaging system offline after second security issue reported
Tea app takes messaging system offline after second security issue reported https://etimg.etb2bimg.com/thumb/msid-122988119,imgsize-244120,width-1200,height=627,overlay-etciso,resizemode-75/data-breaches/tea-app-takes-messaging-system-offline-after-second-security-issue-reported.jpg Tea, a dating discussion app that recently suffered a high-profile cybersecurity breach, announced late Monday that some direct messages were also accessed in the incident. The app – designed to let women safely discuss men they date – rocketed to the top of the US Apple App Store ...
Read More »Hackers Use Facebook Ads to Spread JSCEAL Malware via Fake Cryptocurrency Trading Apps
Hackers Use Facebook Ads to Spread JSCEAL Malware via Fake Cryptocurrency Trading Apps https://firewall.firm.in/wp-content/uploads/2025/07/btc.jpg Jul 30, 2025Ravie LakshmananCryptocurrency / Browser Security Cybersecurity researchers are calling attention to an ongoing campaign that distributes fake cryptocurrency trading apps to deploy a compiled V8 JavaScript (JSC) malware called JSCEAL that can capture data from credentials and wallets. The activity leverages thousands of malicious ...
Read More »Hack alert: St Paul hit by coordinated digital attack; Minnesota calls in National Guard
Hack alert: St Paul hit by coordinated digital attack; Minnesota calls in National Guard https://etimg.etb2bimg.com/thumb/msid-122996327,imgsize-30116,width-1200,height=627,overlay-etciso,resizemode-75/data-breaches/hack-alert-st-paul-hit-by-coordinated-digital-attack-minnesota-calls-in-national-guard.jpg Minnesota called in the National Guard after a “deliberate, coordinated, digital attack” hit the city of St Paul, severely disrupting public services and forcing a complete shutdown of municipal information systems. St. Paul Mayor Melvin Carter confirmed during a press conference on Tuesday that the ...
Read More »
Firewall Security Company India Complete Firewall Security Solutions Provider Company in India











