The misplaced trust in hashing as a privacy safeguard https://etimg.etb2bimg.com/thumb/msid-127922907,imgsize-2078872,width-1200,height=627,overlay-etciso,resizemode-75/data-breaches/hashing-the-illusion-of-privacy-in-data-sharing.jpg Across industries, hashing has become the default mechanism for “privacy-safe” data collaboration. From advertising to financial services, organisations routinely share and compare hashed identifiers, such as phone numbers or email addresses, under the assumption that hashing renders personal data effectively anonymous. That assumption is increasingly being challenged. Recent demonstrations by ...
Read More »Vulnerabilities & Exploits
UnsolicitedBooker Targets Central Asian Telecoms With LuciDoor and MarsSnake Backdoors
UnsolicitedBooker Targets Central Asian Telecoms With LuciDoor and MarsSnake Backdoors https://firewalls.firm.in/wp-content/uploads/2026/02/TELECOM.jpg The threat activity cluster known as UnsolicitedBooker has been observed targeting telecommunications companies in Kyrgyzstan and Tajikistan, marking a shift from prior attacks aimed at Saudi Arabian entities. The attacks involve the deployment of two distinct backdoors codenamed LuciDoor and MarsSnake, according to a report published by Positive Technologies ...
Read More »India in talks with 30+ nations to curb AI misuse
India in talks with 30+ nations to curb AI misuse https://etimg.etb2bimg.com/thumb/msid-128447441,imgsize-63784,width-1200,height=627,overlay-etciso,resizemode-75/data-breaches/india-in-talks-with-30-nations-to-curb-ai-misuse.jpg Electronics and IT minister Ashwini Vaishnaw on Monday said India is in discussions with ministers from over 30 countries to develop common technical and legal solutions to tackle the misuse of AI in media, as deepfakes and synthetic content pose growing risks to trust, democracy and creative industries. At ...
Read More »⚡ Weekly Recap: Double-Tap Skimmers, PromptSpy AI, 30Tbps DDoS, Docker Malware & More
⚡ Weekly Recap: Double-Tap Skimmers, PromptSpy AI, 30Tbps DDoS, Docker Malware & More https://firewalls.firm.in/wp-content/uploads/2026/02/cyber-recap.jpg Ravie LakshmananFeb 23, 2026Cybersecurity / Hacking Security news rarely moves in a straight line. This week, it feels more like a series of sharp turns, some happening quietly in the background, others playing out in public view. The details are different, but the pressure points are ...
Read More »Explainability embedded in data resilience is essential for compliance
Explainability embedded in data resilience is essential for compliance https://etimg.etb2bimg.com/thumb/msid-128592186,imgsize-4478,width-1200,height=627,overlay-etciso,resizemode-75/data-breaches/navigating-data-resilience-and-compliance-the-critical-need-for-explainability-in-indias-digital-landscape.jpg Across Asia Pacific, the regulatory momentum is unmistakable, and India is no exception. In India, the Digital Personal Data Protection Act (DPDP Act), 2023 has fundamentally reshaped how enterprises must think about data accountability, breach readiness, and auditability. Once fully enforced through rules, penalties for non-compliance can reach INR 250 ...
Read More »AI-Assisted Threat Actor Compromises 600+ FortiGate Devices in 55 Countries
AI-Assisted Threat Actor Compromises 600+ FortiGate Devices in 55 Countries https://firewalls.firm.in/wp-content/uploads/2026/02/FortiGate.jpg A Russian-speaking, financially motivated threat actor has been observed taking advantage of commercial generative artificial intelligence (AI) services to compromise over 600 FortiGate devices located in 55 countries. That’s according to new findings from Amazon Threat Intelligence, which said it observed the activity between January 11 and February 18, ...
Read More »Nigeria opens probe over suspected data protection breaches
Nigeria opens probe over suspected data protection breaches https://etimg.etb2bimg.com/thumb/msid-128490792,imgsize-13476,width-1200,height=627,overlay-etciso,resizemode-75/data-breaches/nigeria-launches-investigation-into-temu-over-data-protection-violations.jpg Nigeria’s data watchdog has opened a probe into Chinese-owned e-commerce giant Temu for suspected data-law violations, the regulator said on Tuesday, a move that could usher in legal penalties in one of Africa’s biggest markets. The Nigeria Data Protection Commission (NDPC) said concerns over Temu’s data-processing practices – including online surveillance, ...
Read More »Google Reports State-Backed Hackers Using Gemini AI for Recon and Attack Support
Google Reports State-Backed Hackers Using Gemini AI for Recon and Attack Support https://firewalls.firm.in/wp-content/uploads/2026/02/google-ai.jpg Google on Thursday said it observed the North Korea-linked threat actor known as UNC2970 using its generative artificial intelligence (AI) model Gemini to conduct reconnaissance on its targets, as various hacking groups continue to weaponize the tool for accelerating various phases of the cyber attack life cycle, ...
Read More »Data privacy is becoming an infrastructure imperative
Data privacy is becoming an infrastructure imperative https://etimg.etb2bimg.com/thumb/msid-127902085,imgsize-337112,width-1200,height=627,overlay-etciso,resizemode-75/data-breaches/data-privacy-a-key-infrastructure-challenge-for-indian-enterprises.jpg For Indian enterprises, managing data privacy is rapidly becoming fundamental to infrastructure engineering and risk management. It is no longer advisable to relegate privacy to legal tick-boxes or compliance checklists. As organizations modernize digital estates across cloud, hybrid, and edge environments, privacy must be treated as part of the data lifecycle engineering ...
Read More »Exposed Training Open the Door for Crypto-Mining in Fortune 500 Cloud Environments
Exposed Training Open the Door for Crypto-Mining in Fortune 500 Cloud Environments https://firewalls.firm.in/wp-content/uploads/2026/02/pentera.jpg The Hacker NewsFeb 11, 2026Identity Security / Threat Exposure Intentionally vulnerable training applications are widely used for security education, internal testing, and product demonstrations. Tools such as OWASP Juice Shop, DVWA, Hackazon, and bWAPP are designed to be insecure by default, making them useful for learning how ...
Read More »
Firewall Security Company India Complete Firewall Security Solutions Provider Company in India











