APT28 Uses Microsoft Office CVE-2026-21509 in Espionage-Focused Malware Attacks https://firewalls.firm.in/wp-content/uploads/2026/02/office.jpg Ravie LakshmananFeb 03, 2026Vulnerability / Malware The Russia-linked state-sponsored threat actor known as APT28 (aka UAC-0001) has been attributed to attacks exploiting a newly disclosed security flaw in Microsoft Office as part of a campaign codenamed Operation Neusploit. Zscaler ThreatLabz said it observed the hacking group weaponizing the shortcoming on ...
Read More »Cyber Security News
Japan, UK to boost cooperation on critical minerals & cybersecurity
Japan, UK to boost cooperation on critical minerals & cybersecurity https://etimg.etb2bimg.com/thumb/msid-127852522,imgsize-57324,width-1200,height=627,overlay-etciso,resizemode-75/cybercrime-fraud/japan-and-uk-strengthen-ties-in-critical-minerals-and-cybersecurity-amidst-rising-global-tensions.jpg Tokyo: Japan and Britain agreed Saturday to accelerate cooperation on cybersecurity and the supply of critical minerals, as China’s influence grows in the region. British Prime Minister Keir Starmer said his visit to Japan comes at a time “when geopolitical, economic and technological shocks are literally shaking the world.” ...
Read More »50% of organizations may adopt zero-trust data governance by 2028 as unverified AI data grows: Gartner
50% of organizations may adopt zero-trust data governance by 2028 as unverified AI data grows: Gartner https://etimg.etb2bimg.com/thumb/msid-127600739,imgsize-69912,width-1200,height=627,overlay-etciso,resizemode-75/data-breaches/gartner-predicts-50-of-organizations-to-embrace-zero-trust-data-governance-by-2028-amid-ai-data-challenges.jpg Gartner predicts that by 2028, half of organizations will adopt a zero-trust posture for data governance as unverified AI-generated data becomes more widespread. The shift reflects the growing difficulty of distinguishing AI-generated data from human-created data, increasing the need for stronger authentication and ...
Read More »Iran-Linked RedKitten Cyber Campaign Targets Human Rights NGOs and Activists
Iran-Linked RedKitten Cyber Campaign Targets Human Rights NGOs and Activists https://firewalls.firm.in/wp-content/uploads/2026/02/iran-hackers.jpg A Farsi-speaking threat actor aligned with Iranian state interests is suspected to be behind a new campaign targeting non-governmental organizations and individuals involved in documenting recent human rights abuses. The activity, observed by HarfangLab in January 2026, has been codenamed RedKitten. It’s said to coincide with the nationwide unrest ...
Read More »Safe harbour or safe haven for crime? A wake-up call on cybercrime-as-a-service
Safe harbour or safe haven for crime? A wake-up call on cybercrime-as-a-service https://etimg.etb2bimg.com/thumb/msid-127813502,imgsize-97262,width-1200,height=627,overlay-etciso,resizemode-75/cybercrime-fraud/navigating-cybercrime-the-risks-of-data-negligence-and-the-need-for-responsible-digital-design.jpg Negligence in data protection becomes a gateway to criminal misuse, inviting regulatory penalties, civil liabilities and even criminal consequences. In the age of Artificial Intelligence, crime has been industrialized, globalized and technologically sophisticated, increasingly offering a safe haven for organized, tech-savvy criminals. Cybercrime is no longer an ...
Read More »Top 5 Cybersecurity Mistakes Indian Enterprises Should Avoid in 2026, ETCISO
Top 5 Cybersecurity Mistakes Indian Enterprises Should Avoid in 2026, ETCISO India’s digital infrastructure is expanding rapidly, while security capabilities are struggling to mature at the same pace. As organisations scale cloud adoption, AI-driven operations, and digital customer engagement, cyber threats are becoming more frequent, targeted, and disruptive. The India Cyber Threat Report 2026 recorded more than 265 million cyberattacks ...
Read More »Google defeats bid for billions of dollars of new penalties in US privacy class action
Google defeats bid for billions of dollars of new penalties in US privacy class action https://etimg.etb2bimg.com/thumb/msid-127813525,imgsize-35046,width-1200,height=627,overlay-etciso,resizemode-75/data-breaches/google-wins-legal-battle-against-2-billion-penalty-over-privacy-violations.jpg Alphabet’s Google persuaded a federal judge in San Francisco on Friday to reject a bid by consumers for more than $2 billion in penalties over the company’s past collection of data from users who had switched off a key privacy setting. Chief US District ...
Read More »CERT Polska Details Coordinated Cyber Attacks on 30+ Wind and Solar Farms
CERT Polska Details Coordinated Cyber Attacks on 30+ Wind and Solar Farms https://firewalls.firm.in/wp-content/uploads/2026/01/energy.jpg Ravie LakshmananJan 31, 2026Network Security / SCADA CERT Polska, the Polish computer emergency response team, revealed that coordinated cyber attacks targeted more than 30 wind and photovoltaic farms, a private company from the manufacturing sector, and a large combined heat and power plant (CHP) supplying heat to ...
Read More »Zscaler unveils new innovations to secure enterprise AI adoption
Zscaler unveils new innovations to secure enterprise AI adoption https://etimg.etb2bimg.com/thumb/msid-127688880,imgsize-211624,width-1200,height=627,overlay-etciso,resizemode-75/ot-security/zscaler-launches-innovative-ai-security-solutions-for-enterprises.jpg Zscaler has announced new AI security capabilities aimed at helping enterprises manage the security and governance risks associated with expanding use of generative AI and emerging agentic AI systems. The announcement frames the challenge as a visibility and control gap: many organizations do not have a complete inventory of AI ...
Read More »How Synthetic Data Drives Enterprise AI Innovation, ETCISO
How Synthetic Data Drives Enterprise AI Innovation, ETCISO As AI becomes embedded deeper into everyday operations, enterprises are feeding more data into models than ever before. Large language models (LLMs) are now common in customer support, analytics, developer productivity, and knowledge management. AI agents add another layer: systems that can retrieve information, reason over it, and take action across tools ...
Read More »
Firewall Security Company India Complete Firewall Security Solutions Provider Company in India











