Topics: Cyber attack

How Unified Intelligence Is Transforming the Future of Device Security

Device security has always been a balancing act; protecting sensitive data without slowing the business. With remote work, more IoT devices, and smarter attacks,...

The Cost of Blind Trust: How Inadequate Verification Is Fueling India’s Data Scam Epidemic

India’s digital economy is expanding faster than ever. From gig platforms and financial services to e-commerce and remote hiring, millions of transactions, profiles, and...

How Autonomous Infrastructure Will Shape the Future of Enterprise Technology in 2026

Autonomous infrastructure is moving from imagination to inevitability. With its strengths in anticipation, analysis, and correction, it is quietly becoming the foundation of modern...

The Privacy Pivot: BTG Advaya’s Vikram Jeet Singh on Helping Indian Businesses Navigate the DPDPA Transition

Speaking with TechGraph, Vikram Jeet Singh, Partner at BTG Advaya, discussed how the Digital Personal Data Protection Act, 2023 (DPDPA 2023), is compelling Indian...

Why Do Cyber Criminals Target Human Psychology, and How Can We Outsmart Them?

In previous decades, the primary efforts of cybersecurity have centered around the construction of digital barriers, such as firewalls, antivirus systems, and intricate encryption....
- Advertisement -

Redefining Cyber Defense: Ankit Sharma on How Cyble AI Is Strengthening Enterprise Security

Speaking with TechGraph, Ankit Sharma, Senior Director and Head of Solutions Engineering at Cyble, discussed how security teams today face an overwhelming volume of...

Jaguar Land Rover’s £2 Billion Cyber Lesson: Why a Phone Call Is More Dangerous Than Malware

Factories halted. Dealers idle. Suppliers unpaid. In September 2025, Jaguar Land Rover (JLR), one of the world’s most admired automakers, was forced to hit...

Wysetek Systems Acquires Scalezee Technologies to Expand Cloud and DevSecOps Services

Wysetek Systems Technologists Pvt. Ltd., a leading IT infrastructure solutions provider, announced the acquisition of Scalezee Technologies, a specialized DevSecOps and cloud-services firm. The acquisition...

Cyber Insurance Gaps: Why Indian Businesses Discover Their Risks Too Late

The increasing frequency and severity of cyberattacks have made cyber insurance an essential component of risk management for businesses worldwide. However, despite the growing...

Ethical Concerns in Deploying Agentic AI for Cybersecurity

Imagine that it's 3 AM and your company's AI security system just blocked what it thought was a sophisticated attack. No human intervention was...
- Advertisement -

AI-Powered Vigilance: Why Police Forces are Turning to Predictive Algorithms

There has been a global trend in the usage of AI for safeguarding the safety of citizens through AI integrated technology and predictive analysis....

Weaponizing Trust: How Threat Actors Use GenAI and Deepfakes to Breach Digital Security

On an April afternoon, Sarah was scrolling Instagram as she came across a familiar face. The video featured Peter Hargreaves the co-founder of UK’s...

Data Diodes: Using Physics to Stop Trojan Horses at the Gate

Data diodes are the ultimate jugaad solution in the world of high-tech cybersecurity. The term jugaad, rooted in the Indian ethos of innovative, frugal,...

Shopper’s Anxiety in the Age of OTP Scams

As online scams make it to the news headlines every day, the fear of falling prey to this exploitation is very real. Digital transactions...

Passwordless Authentication Firm 1Kosmos Secures $57 Mn in Series B round

1Kosmos, a company that unifies identity proofing and passwordless authentication, has raised $57 million in Series B funding, including a $10 million line of...
- Advertisement -

How Proactive Threat Intelligence Prevents Fraud Before It Starts

The threat landscape of cybercrime is changing at a faster rate than a chameleon changes its color. But defensive tactics? Well, it takes a...

Why data breaches are getting costlier in India

A data breach occurs when unauthorized individuals gain access to confidential or sensitive information, compromising the integrity and security of an individual or a...

Cybersecurity Theater: Why Companies Still Fall for the Illusion of Control

The world now experiences daily security breaches on evening news while ransomware groups operate like major Fortune 500 companies yet enterprises seem to be...

Software and Technology Changing the Industry

The advent of software and technological advancements has been a game-changer across various industries. From enhancing productivity to transforming operational dynamics, tech plays an...

Beyond Firewalls: How Threat Intelligence Platforms Are Transforming Cybersecurity Operations

“Cybersecurity isn't just about building walls—it’s about seeing the enemy before they strike.” In today’s evolving digital landscape, firewalls and antivirus software no longer...
- Advertisement -

The Importance of Zero-Trust Security Models in Safeguarding Data

In an age where cyberattacks grow more sophisticated by the day, traditional security models are no longer enough to safeguard sensitive data. The zero-trust...

Indusface Launches CyberShiksha program to Educate Students on Cybersecurity

Indusface, a leading application security provider for SaaS solutions, has launched CyberShiksha, a national initiative to improve cybersecurity awareness among students. India has emerged as...

The Role of Behavioral Biometrics in Online Fraud Protection

The modern-day hacker has an almost unlimited repertoire of potential attack vectors to choose from when aiming to steal financial or private information from...

Don’t Get Hacked: Why Is Cyber Security So Important To Businesses?

In the wild, a brightly colored bird with no natural defenses becomes easy prey. In the digital jungle, businesses with weak cyber security are...

Don’t Let Your Identity Get Stolen

Identity theft is getting more common. Thirty-three percent of Americans have already been victims. You don’t want to join them if you can help...
- Advertisement -

The Role of Cybersecurity Tools in Protecting Hybrid Cloud Environments

If you're running a business in 2023, the odds are you explored using a cloud environment at some point. Cloud environments are useful for...

Indian Healthcare Faced Enormous Cyber Attacks in 2022, Till Nov: CyberPeace Foundation and Autobot Infosec Report

Cyber attacks on healthcare facilities have been rising in recent years, and the pandemic has only worsened matters. With hospitals and other healthcare facilities...

Chitkara University Signs MoA with Data Security Council of India to Collaborate for Joint Programs on Cyber Security and Privacy

Chitkara University has signed a Memorandum of Association (MoA) with the Data Security Council of India (DSCI) - National Centre of Excellence for Cyber...

Don’t Leave Your Business Vulnerable To Online Threats

Online threats are among some of the most dangerous out there, especially when you have so much information about your business online. It’s essential...

Key Challenges that lie ahead for the Cyber security industry

The global pandemic triggered a need for digitization. While this has many advantages, it has a few associated limitations, the most pertinent being the...
- Advertisement -

Trending