spot_img

Topics: Cyber attack

The Privacy Pivot: BTG Advaya’s Vikram Jeet Singh on Helping Indian Businesses Navigate the DPDPA Transition

Speaking with TechGraph, Vikram Jeet Singh, Partner at BTG Advaya, discussed how the Digital Personal Data Protection Act, 2023 (DPDPA 2023), is compelling Indian...

Why Do Cyber Criminals Target Human Psychology, and How Can We Outsmart Them?

In previous decades, the primary efforts of cybersecurity have centered around the construction of digital barriers, such as firewalls, antivirus systems, and intricate encryption....

Redefining Cyber Defense: Ankit Sharma on How Cyble AI Is Strengthening Enterprise Security

Speaking with TechGraph, Ankit Sharma, Senior Director and Head of Solutions Engineering at Cyble, discussed how security teams today face an overwhelming volume of...

Jaguar Land Rover’s £2 Billion Cyber Lesson: Why a Phone Call Is More Dangerous Than Malware

Factories halted. Dealers idle. Suppliers unpaid. In September 2025, Jaguar Land Rover (JLR), one of the world’s most admired automakers, was forced to hit...

Wysetek Systems Acquires Scalezee Technologies to Expand Cloud and DevSecOps Services

Wysetek Systems Technologists Pvt. Ltd., a leading IT infrastructure solutions provider, announced the acquisition of Scalezee Technologies, a specialized DevSecOps and cloud-services firm. The acquisition...
- Advertisement -

Cyber Insurance Gaps: Why Indian Businesses Discover Their Risks Too Late

The increasing frequency and severity of cyberattacks have made cyber insurance an essential component of risk management for businesses worldwide. However, despite the growing...

Ethical Concerns in Deploying Agentic AI for Cybersecurity

Imagine that it's 3 AM and your company's AI security system just blocked what it thought was a sophisticated attack. No human intervention was...

AI-Powered Vigilance: Why Police Forces are Turning to Predictive Algorithms

There has been a global trend in the usage of AI for safeguarding the safety of citizens through AI integrated technology and predictive analysis....

Weaponizing Trust: How Threat Actors Use GenAI and Deepfakes to Breach Digital Security

On an April afternoon, Sarah was scrolling Instagram as she came across a familiar face. The video featured Peter Hargreaves the co-founder of UK’s...

Data Diodes: Using Physics to Stop Trojan Horses at the Gate

Data diodes are the ultimate jugaad solution in the world of high-tech cybersecurity. The term jugaad, rooted in the Indian ethos of innovative, frugal,...
- Advertisement -

Shopper’s Anxiety in the Age of OTP Scams

As online scams make it to the news headlines every day, the fear of falling prey to this exploitation is very real. Digital transactions...

Passwordless Authentication Firm 1Kosmos Secures $57 Mn in Series B round

1Kosmos, a company that unifies identity proofing and passwordless authentication, has raised $57 million in Series B funding, including a $10 million line of...

How Proactive Threat Intelligence Prevents Fraud Before It Starts

The threat landscape of cybercrime is changing at a faster rate than a chameleon changes its color. But defensive tactics? Well, it takes a...

Why data breaches are getting costlier in India

A data breach occurs when unauthorized individuals gain access to confidential or sensitive information, compromising the integrity and security of an individual or a...

Cybersecurity Theater: Why Companies Still Fall for the Illusion of Control

The world now experiences daily security breaches on evening news while ransomware groups operate like major Fortune 500 companies yet enterprises seem to be...
- Advertisement -

Software and Technology Changing the Industry

The advent of software and technological advancements has been a game-changer across various industries. From enhancing productivity to transforming operational dynamics, tech plays an...

Beyond Firewalls: How Threat Intelligence Platforms Are Transforming Cybersecurity Operations

“Cybersecurity isn't just about building walls—it’s about seeing the enemy before they strike.” In today’s evolving digital landscape, firewalls and antivirus software no longer...

The Importance of Zero-Trust Security Models in Safeguarding Data

In an age where cyberattacks grow more sophisticated by the day, traditional security models are no longer enough to safeguard sensitive data. The zero-trust...

Indusface Launches CyberShiksha program to Educate Students on Cybersecurity

Indusface, a leading application security provider for SaaS solutions, has launched CyberShiksha, a national initiative to improve cybersecurity awareness among students. India has emerged as...

The Role of Behavioral Biometrics in Online Fraud Protection

The modern-day hacker has an almost unlimited repertoire of potential attack vectors to choose from when aiming to steal financial or private information from...
- Advertisement -

Don’t Get Hacked: Why Is Cyber Security So Important To Businesses?

In the wild, a brightly colored bird with no natural defenses becomes easy prey. In the digital jungle, businesses with weak cyber security are...

Don’t Let Your Identity Get Stolen

Identity theft is getting more common. Thirty-three percent of Americans have already been victims. You don’t want to join them if you can help...

The Role of Cybersecurity Tools in Protecting Hybrid Cloud Environments

If you're running a business in 2023, the odds are you explored using a cloud environment at some point. Cloud environments are useful for...

Indian Healthcare Faced Enormous Cyber Attacks in 2022, Till Nov: CyberPeace Foundation and Autobot Infosec Report

Cyber attacks on healthcare facilities have been rising in recent years, and the pandemic has only worsened matters. With hospitals and other healthcare facilities...

Chitkara University Signs MoA with Data Security Council of India to Collaborate for Joint Programs on Cyber Security and Privacy

Chitkara University has signed a Memorandum of Association (MoA) with the Data Security Council of India (DSCI) - National Centre of Excellence for Cyber...
- Advertisement -

Don’t Leave Your Business Vulnerable To Online Threats

Online threats are among some of the most dangerous out there, especially when you have so much information about your business online. It’s essential...

Key Challenges that lie ahead for the Cyber security industry

The global pandemic triggered a need for digitization. While this has many advantages, it has a few associated limitations, the most pertinent being the...

Why You Need to Be Serious About Cybersecurity for Your Business

The digital age has redefined how businesses communicate, advertise, and share information. Cyber threats are also becoming more frequent and sophisticated. Businesses need to...

Sabanci Acquires OT Security startup Radiflow

Israeli OT cybersecurity startup Radiflow has announced that it is being acquired in a two-phase process by Sabanci Group. The initial phase entails a $45...

FireEye launches XDR Platform to Arm Security Operations Teams

FireEye, Inc. (NASDAQ: FEYE), the intelligence-led security company, today introduced FireEye XDR, a unified platform designed to help security operations teams strengthen threat detection,...
- Advertisement -
spot_img

Trending

THE SNAPSHOTS

Sign up to get quick snaps of everyday happening, directly in your inbox.

We don’t spam! Read our privacy policy for more info.