ScarCruft Uses Zoho WorkDrive and USB Malware to Breach Air-Gapped Networks https://firewalls.firm.in/wp-content/uploads/2026/02/keys.jpg Ravie LakshmananFeb 27, 2026Malware / Surveillance The North Korean threat actor known as ScarCruft has been attributed to a fresh set of tools, including a backdoor that uses Zoho WorkDrive for command-and-control (C2) communications to fetch more payloads and an implant that uses removable media to relay commands ...
Read More »Cyber Security News
AI in Indian BFSI & IT: Strengthening cybersecurity against fraud
AI in Indian BFSI & IT: Strengthening cybersecurity against fraud https://etimg.etb2bimg.com/thumb/msid-128801161,imgsize-84408,width-1200,height=627,overlay-etciso,resizemode-75/cybercrime-fraud/it-bfsi-telecom-headline-indias-ai-cybersecurity-push.jpg Banks, fintechs and insurance companies rely heavily on AI for fraud detection, identity monitoring and behavioural analytics. Banking, financial services and insurance (BFSI), information technology services and telecom are emerging as the front-runners in India’s adoption of artificial intelligence (AI) in cybersecurity, driven by high-stakes threats such as fraud, ...
Read More »Rohit Ghai on Platformization, Agent Sprawl and Data Resilience at Barracuda Networks, ETCISO
Rohit Ghai on Platformization, Agent Sprawl and Data Resilience at Barracuda Networks, ETCISO Barracuda Network’s new CEO, Rohit Ghai reflects, in a freewheeling conversation with ETCISO, on how AI is reshaping cybersecurity — not just technologically, but strategically. From compliance pressures to nation-state threats, from under-resourced CISOs to autonomous agents, Ghai believes the industry is entering a defining phase. His ...
Read More »Identity Prioritization isn’t a Backlog Problem – It’s a Risk Math Problem
Identity Prioritization isn’t a Backlog Problem – It’s a Risk Math Problem https://firewalls.firm.in/wp-content/uploads/2026/02/main.gif Most identity programs still prioritize work the way they prioritize IT tickets: by volume, loudness, or “what failed a control check.” That approach breaks the moment your environment stops being mostly-human and mostly-onboarded. In modern enterprises, identity risk is created by a compound of factors: control posture, ...
Read More »UAE foils massive AI cyber attack targeting government digital systems
UAE foils massive AI cyber attack targeting government digital systems https://etimg.etb2bimg.com/thumb/msid-128707420,imgsize-65572,width-1200,height=627,overlay-etciso,resizemode-75/cybercrime-fraud/uae-thwarts-major-ai-driven-cyberattack-on-government-systems.jpg In a weekend that tested the nation’s digital resolve, the United Arab Emirates (UAE) successfully blocked a series of organized and sophisticated cyberattacks. Described by the UAE Cybersecurity Council as having a “terrorist nature,” these assaults directly targeted the country’s vital infrastructure and national digital platforms. The shadowy attackers’ ...
Read More »Stay Ahead of Evolving Risks, ETCISO
Stay Ahead of Evolving Risks, ETCISO In 2026, the world of cybersecurity projected to have been more complex than it had ever before. Cyber risks involve far more than purely technical terms; they additionally have actual impact, like the loss of sensitive data and financial losses. Attackers constantly come out with fresh methods to make use of advantage of people ...
Read More »The misplaced trust in hashing as a privacy safeguard
The misplaced trust in hashing as a privacy safeguard https://etimg.etb2bimg.com/thumb/msid-127922907,imgsize-2078872,width-1200,height=627,overlay-etciso,resizemode-75/data-breaches/hashing-the-illusion-of-privacy-in-data-sharing.jpg Across industries, hashing has become the default mechanism for “privacy-safe” data collaboration. From advertising to financial services, organisations routinely share and compare hashed identifiers, such as phone numbers or email addresses, under the assumption that hashing renders personal data effectively anonymous. That assumption is increasingly being challenged. Recent demonstrations by ...
Read More »UnsolicitedBooker Targets Central Asian Telecoms With LuciDoor and MarsSnake Backdoors
UnsolicitedBooker Targets Central Asian Telecoms With LuciDoor and MarsSnake Backdoors https://firewalls.firm.in/wp-content/uploads/2026/02/TELECOM.jpg The threat activity cluster known as UnsolicitedBooker has been observed targeting telecommunications companies in Kyrgyzstan and Tajikistan, marking a shift from prior attacks aimed at Saudi Arabian entities. The attacks involve the deployment of two distinct backdoors codenamed LuciDoor and MarsSnake, according to a report published by Positive Technologies ...
Read More »Report flags high cyber detections in India; manufacturing among most targeted sectors
Report flags high cyber detections in India; manufacturing among most targeted sectors https://etimg.etb2bimg.com/thumb/msid-128593616,imgsize-16476,width-1200,height=627,overlay-etciso,resizemode-75/cybercrime-fraud/report-flags-high-cyber-detections-in-india-manufacturing-among-most-targeted-sectors.jpg AI-powered and automation-driven cyberattacks are increasingly targeting Indian manufacturing plants, raising concerns about production downtime and supply-chain disruption, according to Seqrite’s India Cyber Threat Report 2026. Between October 2024 and September 2025, the report recorded 265.52 million detections across more than 8 million endpoints in India, averaging ...
Read More »Key Signals for Data Management Control, ETCISO
Key Signals for Data Management Control, ETCISO DPDP readiness is increasingly defined by demonstrability. In large enterprises, personal data moves through business applications, reporting layers, shared workspaces, SaaS ecosystems, vendor operations, and analytics and AI pipelines. Readiness, therefore, starts to provide the ability to produce repeatable evidence across that data estate: where personal data exists, why it is processed, how ...
Read More »
Firewall Security Company India Complete Firewall Security Solutions Provider Company in India











