
Panasonic Energy India posts 14.35% rise in FY25 PBT at ₹176.95 million
New Delhi:
Panasonic Energy India
Co. Ltd. reported a 14.35 per cent year-on-year rise in
profit before tax
(PBT) at ₹176.95 million for the financial year ended March 31, 2025. EBITDA increased by 14.96 per cent to ₹220.72 million, compared to ₹192 million in FY24.
Profit after tax for FY25 stood at ₹117.73 million, marginally up from ₹116.43 million in the previous year. Earnings per share (EPS) rose to ₹15.70 from ₹15.52. The company's market capitalisation stood at ₹2,586.75 million.
Revenue from operations declined by 8.21 per cent to ₹2,684.15 million, down from ₹2,924.21 million in FY24. The company attributed the revenue dip to an exceptional B2B order in the previous year. Adjusted for this, the core business posted a growth of 3 per cent.
'We see India as an opportunity and have been regularly exploring prospective investments to expand our operations and product portfolio. We are pleased with our continued growth trajectory in FY24-25, particularly the significant growth in profitability metrics,' said Akinori Isomura, Chairman and Managing Director, Panasonic Energy India Co. Ltd.
'We are pursuing a three-pillar strategy to drive future growth, focusing on stabilizing strategic investment in Salesforce automation, expanding product portfolio aligned with customer demand while expanding distribution through all the channels including quick-commerce platforms, and increasing investment in brand-building campaigns,' he added.
The company operates a
carbon-neutral factory
in Pithampur, Madhya Pradesh, which is certified by Verra and the International REC Standard. The plant generates 150 KV from solar panels, meeting 30 per cent of its energy needs, and maintains zero wastewater discharge. Half of the plant area is under forest cover.
Panasonic Energy India's product mix includes 87 per cent zinc carbon batteries, 5 per cent alkaline batteries, 5 per cent rechargeable batteries, and 3 per cent lithium coin batteries. The company uses approximately 6 per cent recycled materials in its products and complies with RoHS Directives (EU) 2015/863.
Hashtags

Try Our AI Features
Explore what Daily8 AI can do for you:
Comments
No comments yet...
Related Articles


Time of India
2 days ago
- Time of India
Hackers abuse modified Salesforce app to steal data, extort companies, Google says
By AJ Vicens Hackers are tricking employees at companies in Europe and the Americas into installing a modified version of a Salesforce-related app, allowing the hackers to steal reams of data, gain access to other corporate cloud services and extort those companies, Google said on Wednesday. The hackers - tracked by the Google Threat Intelligence Group as UNC6040 - have "proven particularly effective at tricking employees" into installing a modified version of Salesforce 's Data Loader, a proprietary tool used to bulk import data into Salesforce environments, the researchers said. The hackers use voice calls to trick employees into visiting a purported Salesforce connected app setup page to approve the unauthorized, modified version of the app, created by the hackers to emulate Data Loader. If the employee installs the app, the hackers gain "significant capabilities to access, query, and exfiltrate sensitive information directly from the compromised Salesforce customer environments," the researchers said. The access also frequently gives the hackers the ability to move throughout a customer's network, enabling attacks on other cloud services and internal corporate networks. Technical infrastructure tied to the campaign shares characteristics with suspected ties to the broader and loosely organized ecosystem known as "The Com," known for small, disparate groups engaging in cybercriminal and sometimes violent activity, the researchers said. A Google spokesperson did not share additional details about how many companies have been targeted as part of the campaign, which has been observed over the past several months. A Salesforce spokesperson told Reuters in an email that "there's no indication the issue described stems from any vulnerability inherent in our platform." The spokesperson said the voice calls used to trick employees "are targeted social engineering scams designed to exploit gaps in individual users' cybersecurity awareness and best practices." The spokesperson declined to share the specific number of affected customers, but said that Salesforce was "aware of only a small subset of affected customers," and said it was "not a widespread issue." Salesforce warned customers of voice phishing , or "vishing," attacks and of hackers abusing malicious, modified versions of Data Loader in a March 2025 blog post.

The Hindu
2 days ago
- The Hindu
Hackers abuse modified Salesforce app to steal data, extort companies, Google says
Hackers are tricking employees at companies in Europe and the Americas into installing a modified version of a Salesforce-related app, allowing the hackers to steal reams of data, gain access to other corporate cloud services and extort those companies, Google said on Wednesday. The hackers, tracked by the Google Threat Intelligence Group as UNC6040, have 'proven particularly effective at tricking employees' into installing a modified version of Salesforce's Data Loader, a proprietary tool used to bulk import data into Salesforce environments, the researchers said. The hackers use voice calls to trick employees into visiting a purported Salesforce connected app setup page to approve the unauthorised, modified version of the app, created by the hackers to emulate Data Loader. If the employee installs the app, the hackers gain 'significant capabilities to access, query, and exfiltrate sensitive information directly from the compromised Salesforce customer environments,' the researchers said. The access also frequently gives the hackers the ability to move throughout a customer's network, enabling attacks on other cloud services and internal corporate networks. Technical infrastructure tied to the campaign shares characteristics with suspected ties to the broader and loosely organized ecosystem known as 'The Com,' known for small, disparate groups engaging in cybercriminal and sometimes violent activity, the researchers said. A Google spokesperson told Reuters that roughly 20 organizations have been affected by the UNC6040 campaign, which has been observed over the past several months. A subset of those organisations had data successfully exfiltrated, the spokesperson said. A Salesforce spokesperson told Reuters in an email that 'there's no indication the issue described stems from any vulnerability inherent in our platform.' The spokesperson said the voice calls used to trick employees 'are targeted social engineering scams designed to exploit gaps in individual users' cybersecurity awareness and best practices.' The spokesperson declined to share the specific number of affected customers, but said that Salesforce was "aware of only a small subset of affected customers," and said it was "not a widespread issue." Salesforce warned customers of voice phishing, or "vishing," attacks and of hackers abusing malicious, modified versions of Data Loader in a March 2025 blog post.


Time of India
3 days ago
- Time of India
Google says hackers are using fake Salesforce app to attack businesses
Hackers are targeting employees at companies across Europe and the Americas using a sophisticated social engineering campaign involving a modified Salesforce app, 's cybersecurity arm has said. Tired of too many ads? go ad free now According to Google's Threat Intelligence Group (GTIG), the attackers—identified as UNC6040—have been 'particularly effective' in deceiving corporate users into installing a fake version of Salesforce Data Loader , a legitimate tool used for importing large datasets into Salesforce environments. How hackers are targeting large companies The team at Google explains that the hackers impersonate official Salesforce representatives and are calling employees to direct them to a fake app setup page. There, users are tricked into authorising a malicious version of the Data Loader app that mimics the original software. Once installed, the app grants attackers significant access to sensitive corporate data. Google researchers noted that the hackers can exfiltrate confidential information, query internal systems, and in many cases, pivot to attack other cloud services and internal networks. As per the researchers, technical indicators suggest that the campaign has ties to 'The Com', a loosely organised cybercriminal ecosystem known for orchestrating both online fraud and real-world violence. What Google and Salesforce have to say A Google spokesperson told news agency Reuters that at least 20 organisations have been affected by the UNC6040 operation over the past several months, with some suffering successful data breaches and extortion attempts. Meanwhile, Salesforce, stated that the issue does not stem from any vulnerability in its platform. A company spokesperson emphasised that the attacks rely on voice phishing (vishing) tactics and exploit gaps in employee cybersecurity awareness. Tired of too many ads? go ad free now 'There's no indication the issue described stems from any vulnerability inherent in our platform,' the spokesperson said, adding that the number of affected customers is small and the threat is not considered widespread. Salesforce had previously issued a warning in March 2025, cautioning users about vishing attacks and the risks posed by malicious versions of Data Loader. Stay ready with these 7 essential medical gadgets as COVID cases rise