A threat actor who claims to have stolen 16 million customer records from HDFC Life is demanding a $6.9 million ransom to keep from selling it on the dark web. The stolen records of the Indian insurance giant are being advertised for sale beginning Dec. 6 for 200,000 Tether, or $200,000.
Recent developments in quantum computing show progress toward quantum supremacy, while integration with AI and classical systems creates new possibilities across industries. Leading researchers report significant advancements in qubit processing and error correction.
With over 32 years of experience spanning hardware, enterprise resource software, product development and analytics, Rahul Monie, CISO partner at CTO Bridge Solutions, has been center stage for the IT evolution from basic hardware and software to complex data analytics and cybersecurity technology.
In this episode of Information Security Media Group's monthly series, "Insights APAC," ISMG editors discuss the top cybersecurity developments from November, including Australia's social media ban, Chinese data protection audits and the latest fine against Meta by India.
The privacy vendor market in India is evolving rapidly, as many vendors move from offering point solutions to embracing more integrated, platform solutions that can handle a broader range of privacy requirements, said Anirban Sengupta, partner, risk consulting practice with PwC.
South Korean technology companies have suffered at least 10 cases of sensitive technology leaks by malicious insiders since January and authorities recorded a 20% rise in such incidents over the previous year. The compromised technologies include OLED display technology and DRAM chip designs.
A South Asian threat actor identified as Mysterious Elephant or APT-K-47 by Knownsec 404 researchers is using a Hajj-themed lure to trick victims into malicious payload disguised as a Windows file. The hacker is using upgraded Asyncshell malware disguised as a Microsoft Compiled HTML Help file.
North Korean state actors are using fake websites of foreign technology service firms to sidestep sanctions and raise funding for Kim Jong-Un regime's weapons development programs. SentinelLabs found many of these sites shared similar infrastructure, owners and locations.
India's Competition Commission has fined social media conglomerate Meta over $25 million for forcing WhatsApp users to agree to a sweeping data sharing policy with other Meta platforms. The agency ordered the company to stop using users' data for online advertising on other Meta platforms.
In 2025, companies in China will face additional obligations when data protection audits become mandatory, setting a new benchmark for compliance with privacy laws. China is also expected to introduce regulations on non-personal data to establish a framework for ethical and secure data usage.
Information Security Media Group's Cybersecurity Summit in Mumbai, India, brought together cybersecurity professionals, regulators and technology leaders to examine the challenges in safeguarding India's rapidly digitizing economy and discuss actionable strategies for ensuring cyber defense.
The Australian government is alerting critical infrastructure providers that state-sponsored actors are positioning malware in their networks that can be weaponized to disrupt operations during major crises or a military conflict. The hackers employ living-off-the-land technique to avoid detection.
The acquisition of D'Crypt strengthens ST Engineering's cryptographic and high-security engineering capabilities while addressing evolving OT cybersecurity challenges in critical infrastructure sectors, said Goh Eng Choon, president of cyber at ST Engineering.
ISMG's Cybersecurity Summit: Mumbai on Wednesday hosted a packed audience of cybersecurity leaders, with keynote and plenary speakers stressing the importance of cyber resilience and aligning their processes with India's Digital Personal Data Protection Act.
The Australian government is on track to introduce a bill in the Parliament to ban youths under the age of 16 from accessing social media platforms, but critics say age verification technologies are not accurate and a ban may push children into unsafe, less visible parts of the internet.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing careersinfosecurity.in, you agree to our use of cookies.