C-Suite’s rush to AI blinds leadership to critical security failures, leaving organisations exposed https://etimg.etb2bimg.com/thumb/msid-124332614,imgsize-616410,width-1200,height=627,overlay-etciso,resizemode-75/data-breaches/c-suites-rush-to-ai-blinds-leadership-to-critical-security-failures.jpg As organisations aggressively pursue technologies like artificial intelligence, a dangerous disconnect is growing between innovation and security. Data from Tenable’s State of Cloud and AI Security 2025 report reveals that critical strategic errors – from a reliance on outdated assumptions to the use of purely reactive ...
Read More »Cyber Security News
New Research: AI Is Already the #1 Data Exfiltration Channel in the Enterprise
New Research: AI Is Already the #1 Data Exfiltration Channel in the Enterprise https://firewalls.firm.in/wp-content/uploads/2025/10/ai-data-leak.jpg For years, security leaders have treated artificial intelligence as an “emerging” technology, something to keep an eye on but not yet mission-critical. A new Enterprise AI and SaaS Data Security Report by AI & Browser Security company LayerX proves just how outdated that mindset has become. ...
Read More »Tata Motors shares in focus as JLR prepares £500 million loan to recover from cyberattack disruption
Tata Motors shares in focus as JLR prepares £500 million loan to recover from cyberattack disruption https://etimg.etb2bimg.com/thumb/msid-124329974,imgsize-74936,width-1200,height=627,overlay-etciso,resizemode-75/cybercrime-fraud/tata-motors-shares-in-focus-as-jlr-prepares-500-million-loan-to-recover-from-cyberattack-disruption.jpg Tata Motors shares are expected to be in focus on Monday, October 6, after its UK-based subsidiary, Jaguar Land Rover (JLR) Automotive Plc, announced plans to raise a privately arranged loan of up to £500 million (approximately $674 million). The funds are intended ...
Read More »Building regulation-aware infrastructure for smarter optichannel strategies, ETCISO
Building regulation-aware infrastructure for smarter optichannel strategies, ETCISO Customer communication today is no longer about being present on every channel. Whether it’s a payment reminder, an onboarding guide, or a policy update, customers expect interactions that are timely, relevant, and delivered on the channel they actually prefer. At the same time, businesses must ensure that these communications meet the growing ...
Read More »Tenable exposes AI flaws in Google gemini that could have let hackers steal data from millions
Tenable exposes AI flaws in Google gemini that could have let hackers steal data from millions https://etimg.etb2bimg.com/thumb/msid-124284799,imgsize-39892,width-1200,height=627,overlay-etciso,resizemode-75/data-breaches/google-gemini-ai-vulnerabilities-exposed-by-tenable.jpg Tenable, the exposure management company, has identified three vulnerabilities in Google’s Gemini suite, collectively dubbed the Gemini Trifecta. These flaws, now remediated, exposed users to significant privacy risks that could have enabled attackers to manipulate Gemini’s behavior and silently steal sensitive data such ...
Read More »Phantom Taurus: New China-Linked Hacker Group Hits Governments With Stealth Malware
Phantom Taurus: New China-Linked Hacker Group Hits Governments With Stealth Malware https://firewall.firm.in/wp-content/uploads/2025/09/chinese-hackerss.jpg Sep 30, 2025Ravie LakshmananCyber Espionage / Malware Government and telecommunications organizations across Africa, the Middle East, and Asia have emerged as the target of a previously undocumented China-aligned nation-state actor dubbed Phantom Taurus over the past two-and-a-half years. “Phantom Taurus’ main focus areas include ministries of foreign affairs, ...
Read More »Beware this festive season! Cyber criminals go personal with a new wave of frauds; here’s what you should know
Beware this festive season! Cyber criminals go personal with a new wave of frauds; here’s what you should know https://etimg.etb2bimg.com/thumb/msid-124226350,imgsize-181496,width-1200,height=627,overlay-etciso,resizemode-75/cybercrime-fraud/beware-this-festive-season-cyber-criminals-go-personal-with-a-new-wave-of-frauds-heres-what-you-should-know.jpg Cyber fraud activities are up this festive season, with AI generated tools making the attacks more personal and targeted. Cybersecurity companies report a nearly 40% rise in attacks during festivals, with up to 15% behaviour-based. From targeting shoppers with personalised ...
Read More »Jeetu Patel on AI, Agentic Systems, and Cybersecurity Challenges, ETCISO
Jeetu Patel on AI, Agentic Systems, and Cybersecurity Challenges, ETCISO At a pivotal moment in technology, AI is no longer a distant promise—it’s actively reshaping the cyber threat landscape. Jeetu Patel, President and Chief Product Officer, Cisco, paints a vivid picture of the challenges and opportunities enterprises face as AI systems grow increasingly autonomous. The Agentic Challenge “Everything compounds exponentially ...
Read More »App targeting Charlie Kirk critics leaks user data in huge privacy breach
App targeting Charlie Kirk critics leaks user data in huge privacy breach https://etimg.etb2bimg.com/thumb/msid-124082696,imgsize-1472979,width-1200,height=627,overlay-etciso,resizemode-75/data-breaches/app-targeting-charlie-kirk-critics-leaks-user-data-in-huge-privacy-breach.jpg Charlie Kirk critics app privacy breach: An app created to track people accused of criticizing conservative activist Charlie Kirk has been taken offline after a serious privacy breach exposed its own users’ personal information, as per a report. Cancel the Hate App Launched After Charlie Kirk’s Assassination ...
Read More »Two New Supermicro BMC Bugs Allow Malicious Firmware to Evade Root of Trust Security
Two New Supermicro BMC Bugs Allow Malicious Firmware to Evade Root of Trust Security https://firewall.firm.in/wp-content/uploads/2025/09/bmc-exploit.jpg Sep 23, 2025Ravie LakshmananFirmware Security / Vulnerability Cybersecurity researchers have disclosed details of two security vulnerabilities impacting Supermicro Baseboard Management Controller (BMC) firmware that could potentially allow attackers to bypass crucial verification steps and update the system with a specially crafted image. The medium-severity vulnerabilities, ...
Read More »
Firewall Security Company India Complete Firewall Security Solutions Provider Company in India











