Phone : +91 95 8290 7788 | Email : sales@itmonteur.net

Register & Request Quote | Submit Support Ticket

Home » Cyber Security News

Cyber Security News

ScarCruft Uses Zoho WorkDrive and USB Malware to Breach Air-Gapped Networks

ScarCruft Uses Zoho WorkDrive and USB Malware to Breach Air-Gapped Networks https://firewalls.firm.in/wp-content/uploads/2026/02/keys.jpg Ravie LakshmananFeb 27, 2026Malware / Surveillance The North Korean threat actor known as ScarCruft has been attributed to a fresh set of tools, including a backdoor that uses Zoho WorkDrive for command-and-control (C2) communications to fetch more payloads and an implant that uses removable media to relay commands ...

Read More »

AI in Indian BFSI & IT: Strengthening cybersecurity against fraud

AI in Indian BFSI & IT: Strengthening cybersecurity against fraud https://etimg.etb2bimg.com/thumb/msid-128801161,imgsize-84408,width-1200,height=627,overlay-etciso,resizemode-75/cybercrime-fraud/it-bfsi-telecom-headline-indias-ai-cybersecurity-push.jpg Banks, fintechs and insurance companies rely heavily on AI for fraud detection, identity monitoring and behavioural analytics. Banking, financial services and insurance (BFSI), information technology services and telecom are emerging as the front-runners in India’s adoption of artificial intelligence (AI) in cybersecurity, driven by high-stakes threats such as fraud, ...

Read More »

Rohit Ghai on Platformization, Agent Sprawl and Data Resilience at Barracuda Networks, ETCISO

Rohit Ghai on Platformization, Agent Sprawl and Data Resilience at Barracuda Networks, ETCISO Barracuda Network’s new CEO, Rohit Ghai reflects, in a freewheeling conversation with ETCISO, on how AI is reshaping cybersecurity — not just technologically, but strategically. From compliance pressures to nation-state threats, from under-resourced CISOs to autonomous agents, Ghai believes the industry is entering a defining phase. His ...

Read More »

Identity Prioritization isn’t a Backlog Problem – It’s a Risk Math Problem

Identity Prioritization isn’t a Backlog Problem – It’s a Risk Math Problem https://firewalls.firm.in/wp-content/uploads/2026/02/main.gif Most identity programs still prioritize work the way they prioritize IT tickets: by volume, loudness, or “what failed a control check.” That approach breaks the moment your environment stops being mostly-human and mostly-onboarded. In modern enterprises, identity risk is created by a compound of factors: control posture, ...

Read More »

UAE foils massive AI cyber attack targeting government digital systems

UAE foils massive AI cyber attack targeting government digital systems https://etimg.etb2bimg.com/thumb/msid-128707420,imgsize-65572,width-1200,height=627,overlay-etciso,resizemode-75/cybercrime-fraud/uae-thwarts-major-ai-driven-cyberattack-on-government-systems.jpg In a weekend that tested the nation’s digital resolve, the United Arab Emirates (UAE) successfully blocked a series of organized and sophisticated cyberattacks. Described by the UAE Cybersecurity Council as having a “terrorist nature,” these assaults directly targeted the country’s vital infrastructure and national digital platforms. The shadowy attackers’ ...

Read More »

Stay Ahead of Evolving Risks, ETCISO

Stay Ahead of Evolving Risks, ETCISO In 2026, the world of cybersecurity projected to have been more complex than it had ever before. Cyber risks involve far more than purely technical terms; they additionally have actual impact, like the loss of sensitive data and financial losses. Attackers constantly come out with fresh methods to make use of advantage of people ...

Read More »

The misplaced trust in hashing as a privacy safeguard

The misplaced trust in hashing as a privacy safeguard https://etimg.etb2bimg.com/thumb/msid-127922907,imgsize-2078872,width-1200,height=627,overlay-etciso,resizemode-75/data-breaches/hashing-the-illusion-of-privacy-in-data-sharing.jpg Across industries, hashing has become the default mechanism for “privacy-safe” data collaboration. From advertising to financial services, organisations routinely share and compare hashed identifiers, such as phone numbers or email addresses, under the assumption that hashing renders personal data effectively anonymous. That assumption is increasingly being challenged. Recent demonstrations by ...

Read More »

UnsolicitedBooker Targets Central Asian Telecoms With LuciDoor and MarsSnake Backdoors

UnsolicitedBooker Targets Central Asian Telecoms With LuciDoor and MarsSnake Backdoors https://firewalls.firm.in/wp-content/uploads/2026/02/TELECOM.jpg The threat activity cluster known as UnsolicitedBooker has been observed targeting telecommunications companies in Kyrgyzstan and Tajikistan, marking a shift from prior attacks aimed at Saudi Arabian entities. The attacks involve the deployment of two distinct backdoors codenamed LuciDoor and MarsSnake, according to a report published by Positive Technologies ...

Read More »

Report flags high cyber detections in India; manufacturing among most targeted sectors

Report flags high cyber detections in India; manufacturing among most targeted sectors https://etimg.etb2bimg.com/thumb/msid-128593616,imgsize-16476,width-1200,height=627,overlay-etciso,resizemode-75/cybercrime-fraud/report-flags-high-cyber-detections-in-india-manufacturing-among-most-targeted-sectors.jpg AI-powered and automation-driven cyberattacks are increasingly targeting Indian manufacturing plants, raising concerns about production downtime and supply-chain disruption, according to Seqrite’s India Cyber Threat Report 2026. Between October 2024 and September 2025, the report recorded 265.52 million detections across more than 8 million endpoints in India, averaging ...

Read More »

Key Signals for Data Management Control, ETCISO

Key Signals for Data Management Control, ETCISO DPDP readiness is increasingly defined by demonstrability. In large enterprises, personal data moves through business applications, reporting layers, shared workspaces, SaaS ecosystems, vendor operations, and analytics and AI pipelines. Readiness, therefore, starts to provide the ability to produce repeatable evidence across that data estate: where personal data exists, why it is processed, how ...

Read More »

Information Security - InfoSec - Cyber Security - Firewall Providers Company in India

 

 

 

 

 

 

 

 

 

 

 

 

What is Firewall? A Firewall is a network security device that monitors and filters incoming and outgoing network traffic based on an organization's previously established security policies. At its most basic, a firewall is essentially the barrier that sits between a private internal network and the public Internet.

 

Secure your network at the gateway against threats such as intrusions, Viruses, Spyware, Worms, Trojans, Adware, Keyloggers, Malicious Mobile Code (MMC), and other dangerous applications for total protection in a convenient, affordable subscription-based service. Modern threats like web-based malware attacks, targeted attacks, application-layer attacks, and more have had a significantly negative effect on the threat landscape. In fact, more than 80% of all new malware and intrusion attempts are exploiting weaknesses in applications, as opposed to weaknesses in networking components and services. Stateful firewalls with simple packet filtering capabilities were efficient blocking unwanted applications as most applications met the port-protocol expectations. Administrators could promptly prevent an unsafe application from being accessed by users by blocking the associated ports and protocols.

 

Firewall Firm is an IT Monteur Firewall Company provides Managed Firewall Support, Firewall providers , Firewall Security Service Provider, Network Security Services, Firewall Solutions India , New Delhi - India's capital territory , Mumbai - Bombay , Kolkata - Calcutta , Chennai - Madras , Bangaluru - Bangalore , Bhubaneswar, Ahmedabad, Hyderabad, Pune, Surat, Jaipur, Firewall Service Providers in India

Sales Number : +91 95 8290 7788 | Support Number : +91 94 8585 7788
Sales Email : sales@itmonteur.net | Support Email : support@itmonteur.net

Register & Request Quote | Submit Support Ticket