The draft rules states that any organization that owns, operates, manages, or interfaces with power infrastructure connected to the electricity grid will have to prepare a board-approved cyber security policy, designate a Chief Information Security Officer (CISO), and align to standards by the Power Ministry.
As per the Kaspersky researchers, the infected apps were downloaded over 242,000 times from Google Play Store but it’s the first time they were found in the Apple App Store.
This malware works by sneaking into your phone's gallery and stealing images, it looks for things like cryptocurrency wallet recovery phrases, passwords, or even private messages from screenshots.
On April 10, Apple sent threat notifications to users in 92 countries, warning of potential "mercenary spyware attacks" amid critical elections. Indian iPhone users received alerts of remote compromises, stressing the threat's severity. Apple refrained from attributing the threats under government pressure. Recipients were advised to contact the Digital Security Helpline, while outside organizations offer tailored guidance. Apple updated its support page with tips to counter the threat. Since 2021, Apple has issued similar notifications worldwide
The Mythic framework provides a set of tools and a structure to create, deploy, and manage a Command and Control system for controlling a network of compromised computers.
Cybersecurity is becoming increasingly a threat as AI develops. Attackers are using AI to launch increasingly complex attacks on businesses.
Trading members who meet a certain criteria have to onboard themselves by November 6.
The latest version of the Grid Code mandates regular cybersecurity audits by all users. This is yet another step by agencies such as the Central Electricity Authority (CEA) and Central Electricity Regulatory Commission (CERC) to help prevent cyberattacks in the power sector.
The malware was being circulated by a cybercriminal group over Telegram under the guise of legitimate applications such as ChatGPT, the Opera Mini browser, premium versions of YouTube, and other popular apps and websites.
Starting on August 31, links that appear in the comments section, the descriptions of Shorts videos and the vertical live feed will no longer be clickable.
The discovery of the malware has raised fears that Chinese hackers, probably working for the People’s Liberation Army, have inserted code designed to disrupt U.S. military operations in the event of a conflict
The tool is currently being sold on a popular hacking forum and was trained on a diverse array of data including malware.
This is the latest in the line of cyber attacks on government bodies, especially defence organisations that deal with sensitive and critical information on a day-to-day basis.
Ransomware group BlackCat has claimed responsibility for the hack and claim to have 80GB of compressed data.
The email contains a hyperlinked text titled "Honey Trap Case and Precautions," which unsuspecting officials may click on thinking it to be an educative advisory.
On the surface, the SpinOk module is designed to maintain users’ interest in apps with the help of mini-games, a system of tasks, and alleged prizes and reward drawings, the report said. But on clicking on it...
The malware was installed by stated-sponsored actor Volt Typhoon, who has been active since mid-2021.
This CERT-In report has come at a time when Indian government websites have been reported of being targeted by Indonesian hacktivists, and few months after All India Medical Institute of Medical Sciences suffered a major ransomware breach that rendered several of its services inaccessible.
CyberArk security researchers got the code by asking ChatGPT to do the same thing using multiple constraints and ‘asking it to obey’
The hackers are believed to be working with the North Korean government
Employees were also advised not to connect personal laptop computers to the Central Pollution Control Board's network.
The malware targets both Windows and Android devices and has victims spread across Spain, Portugal and Canada
The leak resulted in the creation of malware apps that gain access to Android devices.
Elon Musk contiunes to take the torch to Twitter, Qualcomm announces the Sanpdragon 8 Gen 2 chip, VLC is back in India, Intel takes aim at Deepfakes, and more.
CDSL has isolated the internal machines and disconnected itself from other constituents of the capital market, it said, adding that settlement activities would be completed after the resolution of the incident.