Qantas customer data released by hackers after July breach, says airline https://etimg.etb2bimg.com/thumb/msid-124516943,imgsize-29794,width-1200,height=627,overlay-etciso,resizemode-75/data-breaches/qantas-customer-data-released-by-hackers-after-july-breach-says-airline.jpg Qantas Airways said on Sunday, October 12 that it is among the companies whose customer data was published by cybercriminals following a July database breach, reports Reuters. The airline had previously confirmed that more than one million customers had sensitive details such as phone numbers, birth dates, or ...
Read More »Vulnerabilities & Exploits
Chinese Hackers Exploit ArcGIS Server as Backdoor for Over a Year
Chinese Hackers Exploit ArcGIS Server as Backdoor for Over a Year https://firewalls.firm.in/wp-content/uploads/2025/10/chinese-hackers.jpg Oct 14, 2025Ravie LakshmananCyber Espionage / Network Security Threat actors with ties to China have been attributed to a novel campaign that compromised an ArcGIS system and turned it into a backdoor for more than a year. The activity, per ReliaQuest, is the handiwork of a Chinese state-sponsored ...
Read More »Fortinet report: Data loss rises despite stronger security and higher spending
Fortinet report: Data loss rises despite stronger security and higher spending https://etimg.etb2bimg.com/thumb/msid-124407373,imgsize-14212,width-1200,height=627,overlay-etciso,resizemode-75/data-breaches/fortinet-report-data-loss-rises-despite-stronger-security-and-higher-spending.jpg The 2025 Data Security Report from Fortinet and Cybersecurity Insiders reveals that despite adopting smarter strategies and increasing budgets, data loss incidents continue to rise. While most organizations rely on some form of data loss prevention (DLP), many lack visibility into how employees interact with data—particularly across SaaS ...
Read More »Stealit Malware Abuses Node.js Single Executable Feature via Game and VPN Installers
Stealit Malware Abuses Node.js Single Executable Feature via Game and VPN Installers https://firewalls.firm.in/wp-content/uploads/2025/10/nodejs-malware.jpg Oct 10, 2025Ravie LakshmananRansomware / Data Theft Cybersecurity researchers have disclosed details of an active malware campaign called Stealit that has leveraged Node.js’ Single Executable Application (SEA) feature as a way to distribute its payloads. According to Fortinet FortiGuard Labs, select iterations have also employed the open-source ...
Read More »C-Suite’s rush to AI blinds leadership to critical security failures, leaving organisations exposed
C-Suite’s rush to AI blinds leadership to critical security failures, leaving organisations exposed https://etimg.etb2bimg.com/thumb/msid-124332614,imgsize-616410,width-1200,height=627,overlay-etciso,resizemode-75/data-breaches/c-suites-rush-to-ai-blinds-leadership-to-critical-security-failures.jpg As organisations aggressively pursue technologies like artificial intelligence, a dangerous disconnect is growing between innovation and security. Data from Tenable’s State of Cloud and AI Security 2025 report reveals that critical strategic errors – from a reliance on outdated assumptions to the use of purely reactive ...
Read More »New Research: AI Is Already the #1 Data Exfiltration Channel in the Enterprise
New Research: AI Is Already the #1 Data Exfiltration Channel in the Enterprise https://firewalls.firm.in/wp-content/uploads/2025/10/ai-data-leak.jpg For years, security leaders have treated artificial intelligence as an “emerging” technology, something to keep an eye on but not yet mission-critical. A new Enterprise AI and SaaS Data Security Report by AI & Browser Security company LayerX proves just how outdated that mindset has become. ...
Read More »Tenable exposes AI flaws in Google gemini that could have let hackers steal data from millions
Tenable exposes AI flaws in Google gemini that could have let hackers steal data from millions https://etimg.etb2bimg.com/thumb/msid-124284799,imgsize-39892,width-1200,height=627,overlay-etciso,resizemode-75/data-breaches/google-gemini-ai-vulnerabilities-exposed-by-tenable.jpg Tenable, the exposure management company, has identified three vulnerabilities in Google’s Gemini suite, collectively dubbed the Gemini Trifecta. These flaws, now remediated, exposed users to significant privacy risks that could have enabled attackers to manipulate Gemini’s behavior and silently steal sensitive data such ...
Read More »Phantom Taurus: New China-Linked Hacker Group Hits Governments With Stealth Malware
Phantom Taurus: New China-Linked Hacker Group Hits Governments With Stealth Malware https://firewall.firm.in/wp-content/uploads/2025/09/chinese-hackerss.jpg Sep 30, 2025Ravie LakshmananCyber Espionage / Malware Government and telecommunications organizations across Africa, the Middle East, and Asia have emerged as the target of a previously undocumented China-aligned nation-state actor dubbed Phantom Taurus over the past two-and-a-half years. “Phantom Taurus’ main focus areas include ministries of foreign affairs, ...
Read More »App targeting Charlie Kirk critics leaks user data in huge privacy breach
App targeting Charlie Kirk critics leaks user data in huge privacy breach https://etimg.etb2bimg.com/thumb/msid-124082696,imgsize-1472979,width-1200,height=627,overlay-etciso,resizemode-75/data-breaches/app-targeting-charlie-kirk-critics-leaks-user-data-in-huge-privacy-breach.jpg Charlie Kirk critics app privacy breach: An app created to track people accused of criticizing conservative activist Charlie Kirk has been taken offline after a serious privacy breach exposed its own users’ personal information, as per a report. Cancel the Hate App Launched After Charlie Kirk’s Assassination ...
Read More »Two New Supermicro BMC Bugs Allow Malicious Firmware to Evade Root of Trust Security
Two New Supermicro BMC Bugs Allow Malicious Firmware to Evade Root of Trust Security https://firewall.firm.in/wp-content/uploads/2025/09/bmc-exploit.jpg Sep 23, 2025Ravie LakshmananFirmware Security / Vulnerability Cybersecurity researchers have disclosed details of two security vulnerabilities impacting Supermicro Baseboard Management Controller (BMC) firmware that could potentially allow attackers to bypass crucial verification steps and update the system with a specially crafted image. The medium-severity vulnerabilities, ...
Read More »
Firewall Security Company India Complete Firewall Security Solutions Provider Company in India











