News
What Makes C-CISO Program by FCRF So Relevant to Cyber Leaders Right Now?
6+ hour, 36+ min ago (314+ words) For years, the chief information security officer was often treated as a senior technical specialist, important to the enterprise but still somewhat apart from its strategic center. That distinction is fading quickly. The appeal, then, is not hard to understand....
Only 10 Days Left to Join India’s Premier CISO Certification Program
3+ day, 9+ hour ago (510+ words) The pitch for cybersecurity leadership training in India is no longer built around aspiration alone. It is built around pressure. Boards want clearer answers on cyber risk. Regulators expect more structured reporting. Enterprises are being forced to translate technical vulnerabilities…...
Mumbai Cyber Teams Launch Door-to-Door Awareness Drive for Senior Citizens
3+ day, 20+ hour ago (479+ words) In a proactive move against rising cyber fraud, Mumbai has witnessed a unique initiative where cyber teams are reaching out to citizens even before a crime occurs. The campaign is specifically targeting senior citizens living alone, who are considered highly…...
India Pulls The Plug On Chinese CCTV Makers Amid New Security Certification Rules
5+ day, 19+ hour ago (399+ words) India is set to bar several Chinese surveillance equipment manufacturers from selling internet-connected CCTV cameras in the country starting April 1, 2026, following the implementation of new certification and security compliance rules. The move is part of a broader effort to strengthen…...
European Commission Hit By Cyberattack, Investigation Launched Into Possible Data Theft
6+ day, 19+ hour ago (424+ words) The European Commission has confirmed that it was targeted by a cyberattack affecting part of its digital infrastructure, with an investigation launched into a possible data breach. Officials said the incident was detected and contained quickly, but preliminary findings indicate…...
Leak Bazaar: The Underground Market Turning Stolen Data into Intelligence Products
6+ day, 21+ hour ago (604+ words) Cybercrime is no longer limited to data theft'it has evolved into a structured and profit-driven digital business. A newly emerged platform called "Leak Bazaar" is at the centre of this shift, transforming stolen corporate data into refined, reusable products that…...
Invisible Frontlines: How Electronic Warfare Is Shaping the Iran Conflict
1+ week, 2+ day ago (247+ words) Modern military operations now begin in the invisible domain of electronic warfare, where adversaries attempt to disrupt communications, radar systems, navigation tools, and command networks. This phase often occurs before any visible military action and is designed to weaken the…...
U.S. Imposes Strict Ban on New Foreign-Made Routers, Citing Security Concerns
1+ week, 4+ day ago (379+ words) The U.S. Federal Communications Commission (FCC) has imposed a ban on the import of new foreign-made Wi-Fi routers, citing national security concerns. The FCC updated its "Covered List" to include consumer routers manufactured by foreign companies, signaling heightened scrutiny over potential…...
Debate Intensifies Over UK Cyber Strategy Following ₹18,800 crore JLR Bailout
2+ week, 13+ hour ago (428+ words) At an event marking the first operational year of the Cyber Monitoring Centre (CMC), Ciaran Martin, chair of the CMC's technical committee and a distinguished fellow at RUSI, said that the government's case-specific intervention could set a long-term precedent if applied…...
FBI Warns Of Advanced Malware Campaign Using Telegram As Command Hub
2+ week, 16+ hour ago (238+ words) A new cybersecurity advisory issued by the Federal Bureau of Investigation through its Internet Crime Complaint Center has revealed a highly targeted cyber campaign in which threat actors are using Telegram as command-and-control (C2) infrastructure to deploy malware and conduct surveillance…...