logo
#

Latest news with #Cyble

Bridging the gap between ground reality and global standards
Bridging the gap between ground reality and global standards

Hindustan Times

time28-07-2025

  • Business
  • Hindustan Times

Bridging the gap between ground reality and global standards

India is leading the race of digital transformation and currently stands at the crossroads in its cybersecurity journey. Cybersecurity (Shutterstock (PIC FOR REPRESENTATION)) With over 800 million internet users in the country and a rural penetration of 488 million, it would not be incorrect to say that digital transformation is being driven through the remotest villages and towns of the country. Add to this, the reliance on digital transactions through revolutionary tech of UPI payments system, and the stakes for cybersecurity become astronomically high. The country has made significant strides in establishing a regulatory framework to counter the threats coming to the fore for digital adoptions by launching key initiatives. But the ground reality of an expanding cyber threat landscape continues to pose formidable challenges when compared to the global cybersecurity standards. India's ambition of being a leader in the digital realm is clear. But the path is intertwined with a dynamic interplay of vulnerabilities and evolving defences. India's digital footprint grew ten-fold especially in the years post pandemic. With an expansive digital footprint, the country has inevitably broadened its attack surface and invariably making it a prime target for cyber adversaries. According to the Cyble's Threat Landscape Report, India ranked as the most targeted country in Asia and second most globally. Another report on defining the ransomware threat landscape, also quoted India as the prime target in the APAC region. Qilin, RansomHub and Cl0P were the most active actors with information technology (IT) and manufacturing being the most targeted sectors. The financial toll is equally alarming. The country lost an astounding ₹22,845.73 crore to cybercriminals in 2024, marking a sharp 206% surge from the previous year. The main cyber threats include ransomware, phishing campaigns, data breaches, and a rising number of Artificial Intelligence (AI)-driven deepfake attacks. In the underbelly of these alarming numbers are persistent and systemic vulnerabilities that are out in the open yet often ignored. Some of them are: Low cybersecurity awareness: A significant portion of the population, like mentioned earlier, is from rural parts where awareness is usually restricted to only checkbox campaigns. But this is not just a rural or urban problem. Many enterprises in tier 1 and 2 cities also lack basic awareness of safer online practices. This makes human error a leading cause of breaches. A significant portion of the population, like mentioned earlier, is from rural parts where awareness is usually restricted to only checkbox campaigns. But this is not just a rural or urban problem. Many enterprises in tier 1 and 2 cities also lack basic awareness of safer online practices. This makes human error a leading cause of breaches. Skill shortage: There is huge gap in the demand and supply for skilled cybersecurity professionals. Of course, universities and education system, in general, is now taking note of this. There is huge gap in the demand and supply for skilled cybersecurity professionals. Of course, universities and education system, in general, is now taking note of this. Outdated frameworks and resource constraints: Several organisations, particularly MSMEs, struggle with legacy systems and resource limitations. Some of the core banking functionalities in India also still run on outdated technology which makes the adoption of advanced security solutions difficult. Several organisations, particularly MSMEs, struggle with legacy systems and resource limitations. Some of the core banking functionalities in India also still run on outdated technology which makes the adoption of advanced security solutions difficult. Under-reporting: Reputational damage is the biggest fear businesses and organisations face when it comes to breaches and security incidents. This is the prime reason why several incidents often go unreported. Despite the challenges, India has made significant efforts to match the capabilities of its foreign counterparts. The country is moving towards a multi-layered cybersecurity framework designed to safeguard its digital ecosystem. The Information Technology (IT) Act, 2000, although a couple of decades old, has undergone significant amendments. It serves as baseline legislation and governs cybercrime, data protection, and electronic transactions. The law requires organisations handling sensitive personal data of Indian to follow reasonable security practices and procedures. To further strengthen its data governance and give the power of owning the data to its uses, the government has also introduced the Digital Personal Data Protection Act of 2023 (DPDP Act). This act not only strengthens individual data privacy rights but also align India more closely with global data protection standard like the European Union's GDPR framework. With a view to help industry specific incident response, the country also established the Indian Computer Emergency Response Team (CERT-In). It aids organisations in providing first-hand incident response by collecting, analysing and disseminating threat intelligence. Additionally, the government has established the Indian Cyber Crime Coordination Centre (I4C), and the National Critical Information Infrastructure Protection Centre (NCIIPC) which provides added expertise with threats related to frauds and critical infrastructure. Other government Initiatives like Cyber Swachhta Kendra offer free tools for malware analysis and botnet tracking, while the National Centre of Excellence (NCoE) in collaboration with DSCI focuses on cybersecurity technology development and entrepreneurship among the younger generation. India believes cyber threats transcend borders and thus also actively forging partnerships through Memoranda of Understanding (MoUs), which will help in sharing of threat intelligence with its allies like the UK, Japan, and the US. On paper, India's legislative and institutional architecture looks robust and promising, the challenge though lies in its consistent and widespread implementation across a diverse and rapidly digitising economy. Regulatory gaps persist and many businesses are striving to achieve full compliance with evolving laws. India aspires to build its own capabilities, reduce external dependence, and emerge not just as a leading consumer of digital technologies, but also a trusted global provider of tech products, services, and solutions. The recently drafted National Telecom Policy 2025 (NTP-25) is the proof of India's commitment towards it. The policy explicitly factors in next-generation technologies like 5G/6G, AI, IoT, and quantum communications, aiming for a 10% global share in 6G-related Intellectual Property Rights (IPR) by 2030. This signals a strategic push towards not just following but setting global standards in critical areas. The journey from ground reality to global leadership in cybersecurity is complex and continuous. It demands sustained investment in talent development, a proactive approach to emerging threats like AI-powered attacks, the widespread adoption of advanced security paradigms like AI-driven threat intelligence, and a cultural shift towards prioritising cybersecurity at every level. India's digital future and its national security hinges on its ability to effectively bridge this crucial gap. This article is authored by Ankit Sharma, senior director and head, solutions engineering, Cyble.

Password Hack Warning As New Threat Jumps From Your Laptop To Phone
Password Hack Warning As New Threat Jumps From Your Laptop To Phone

Forbes

time22-07-2025

  • Forbes

Password Hack Warning As New Threat Jumps From Your Laptop To Phone

Scanception password attack magically jumps from laptop to smartphone. getty Update, July 22, 2025: This story, originally published on July 20, has been updated with an expert counterpoint to the idea that it's the delivery mechanism being what's important in the latest password hack attack analysis. Your passwords are under attack. It really is as simple as that. I mean, it's not surprising when 98.5% fail the most basic password hacking test, and cross-service password reuse just adds fuel to the credentials attack fire. Behind much of this barrage of threat actor activity lies one tactic: phishing. One newly analysed and ongoing password hacking campaign, given the name Scanception by security researchers, uses a transitional tactic to switch the attack from your laptop to your smartphone, which is likely to have much less protection. Here's what you need to know. Forbes Microsoft Confirms Global SharePoint Attack — Emergency Update Issued By Davey Winder At the heart of the Scanception password hack campaign, as analyzed by the Cyble Research & Intelligence Labs team, is an old friend of the Forbes cybersecurity section, quishing. Oh my goodness, I just used that awful word, didn't I? QR code phishing, to be a little longer-winded but much less cheesy, is where the scanning of a QR code takes the unsuspecting user to a malicious site where harm can be done. That might be by way of malware downloads, including infostealers, or more straightforward credential theft involving a cloned account login page. 'The attack chain typically begins with a phishing email containing a PDF lure that urges recipients to scan an embedded QR code,' the Cyble report said, noting this technique 'effectively bypasses traditional email security and endpoint protection controls by shifting the attack surface to unmanaged personal mobile devices.' In the space of just 12 short weeks, the threat actors behind the Scanception campaign, which is very much still active, ongoing and evolving, have used at least 600 unique PDF document lures, and Cyble reported that 'nearly 80% of the quishing PDFs we observed had zero detections on VirusTotal.' The attack has so far targeted a broad sweep of users across North America, EMEA and APAC regions, and high-value industries appear to be favored by the threat actors behind the campaign. These include tech, healthcare, manufacturing and financial sectors. Rather cleverly, the attackers have embedded the malicious QR code at the very end of a four-page PDF that appears legitimate. No doubt intended to evade those detection methods that only scan the start of a document, rather than the whole thing. To scan the QR code and access the further information it promises, the user must use their smartphone camera, thereby shifting the attack from the laptop to the phone. Forbes Amazon Ring Doorbell May 28 Mass Hacking Claim Goes Viral By Davey Winder The Cyble Research & Intelligence Labs team recommended the following mitigation measures: The deployment of email security solutions that are able to inspect both attachments and, importantly, embedded QR codes. Expanding security protections beyond the network perimeter. Monitoring for malicious domains and URLs. Emphasizing the dangers of QR-based attacks to staff. Clever New QR Code Password Hack Or Same Phishing Playbook That's Been Used For 20 Years? Not everyone, it has to be said, agrees with the idea that the latest QR code password hack attack campaign is anything new or sophisticated. I don't disagree with this opinion, in as far as QR phishing is, after all, just phishing when all is said and done. What's more, such 'quishing' attacks are not new either. I did think that the delivery mechanism, especially the way that the code itself was left to the end of the PDF to evade detection mechanism, was worth highlighting. 'This is not new,' Paul Walsh, CEO at MetaCert, messaged me to argue, 'This is not sophisticated. It is the same impersonation playbook used for 20 years. Scan. Click. Trust. Regret.' Walsh does, of course, have skin in the game as his company revolves around a technology to verify links before any user has the chance to try and decide if they are trustworthy or not. That said, the counterpoint was strong enough to warrant an outing here. 'Instead of asking why security software still fails to detect phishing links,' Walsh said, 'we focus on sensational terms, like quishing or scanception, that just add noise.' The delivery method, in other words, is just a distraction, and it's the entry point where the focus should sit. Walsh argued that the quote 'Effectively bypasses traditional email security and endpoint protection controls by shifting the attack surface to unmanaged personal mobile devices,' is misleading. 'The attack does not shift anything,' Walsh explained, 'it just delivers the same type of phishing link in a different wrapper.' Forbes Amazon Warns 220 Million Customers Of Prime Account Attacks By Davey Winder Walsh also took umbrage with the mitigation advice of deploying email security solutions able to inspect both attachments and embedded QR codes. 'This is not bad advice,' Walsh said, 'but it solves the wrong problem.' What Walsh is getting at is that the QR code itself isn't dangerous, it's just a code after all. It's the link that is dangerous and if that link is already verified before loading then 'it doesn't matter whether it was delivered by QR code, email, SMS or a pigeon.' Again, I'm not going to say that Walsh is wrong, that would be disingenuous of me. However, I can't agree that he is 100% correct either. At least not in the real world where the vast majority of people don't have access to his MetaCert system either through using the app or web browser extension or, and I know it's something that is being worked on, by way of the service or network provider licensing it in the background. Until such a time, if it ever does gain that critical momentum, we have to work with what we've got — and that means fighting phishing, including this latest QR-driven password hack attack, using all the techniques, no matter how imperfect, that we already have available to us.

This Password Hack Jumps From Laptop To Smartphone — Attacks Underway
This Password Hack Jumps From Laptop To Smartphone — Attacks Underway

Forbes

time20-07-2025

  • Forbes

This Password Hack Jumps From Laptop To Smartphone — Attacks Underway

Scanception password attack magically jumps from laptop to smartphone. Your passwords are under attack. It really is as simple as that. I mean, it's not surprising when 98.5% fail the most basic password hacking test, and cross-service password reuse just adds fuel to the credentials attack fire. Behind much of this barrage of threat actor activity lies one tactic: phishing. One newly analysed and ongoing password hacking campaign, given the name Scanception by security researchers, uses a transitional tactic to switch the attack from your laptop to your smartphone, which is likely to have much less protection. Here's what you need to know. The Scanception Password Hack Attack Explained At the heart of the Scanception password hack campaign, as analyzed by the Cyble Research & Intelligence Labs team, is an old friend of the Forbes cybersecurity section, quishing. Oh my goodness, I just used that awful word, didn't I? QR code phishing, to be a little longer-winded but much less cheesy, is where the scanning of a QR code takes the unsuspecting user to a malicious site where harm can be done. That might be by way of malware downloads, including infostealers, or more straightforward credential theft involving a cloned account login page. 'The attack chain typically begins with a phishing email containing a PDF lure that urges recipients to scan an embedded QR code,' the Cyble report said, noting this technique 'effectively bypasses traditional email security and endpoint protection controls by shifting the attack surface to unmanaged personal mobile devices.' In the space of just 12 short weeks, the threat actors behind the Scanception campaign, which is very much still active, ongoing and evolving, have used at least 600 unique PDF document lures, and Cyble reported that 'nearly 80% of the quishing PDFs we observed had zero detections on VirusTotal.' The attack has so far targeted a broad sweep of users across North America, EMEA and APAC regions, and high-value industries appear to be favored by the threat actors behind the campaign. These include tech, healthcare, manufacturing and financial sectors. Rather cleverly, the attackers have embedded the malicious QR code at the very end of a four-page PDF that appears legitimate. No doubt intended to evade those detection methods that only scan the start of a document, rather than the whole thing. To scan the QR code and access the further information it promises, the user must use their smartphone camera, thereby shifting the attack from the laptop to the phone. Mitigating The Scanception Password Hack Attacks The Cyble Research & Intelligence Labs team recommended the following mitigation measures:

Cyble Recognized as a Sample Vendor in Three Gartner® Hype Cycle™ Reports for the Second Consecutive Year
Cyble Recognized as a Sample Vendor in Three Gartner® Hype Cycle™ Reports for the Second Consecutive Year

Yahoo

time14-07-2025

  • Business
  • Yahoo

Cyble Recognized as a Sample Vendor in Three Gartner® Hype Cycle™ Reports for the Second Consecutive Year

CUPERTINO, Calif., July 14, 2025 /CNW/ -- Cyble, a global leader in AI-native cybersecurity solutions is pleased to announce its recognition in three Gartner® reports: the Gartner Hype Cycle for Security Operations, 2025, Gartner Hype Cycle for Managed IT Services, 2025 and Hype Cycle for Cyber-Risk Management, 2025(Interactive Version). Cyble has been listed as a Sample Vendor for Digital Risk Protection Services (DRPS), Threat Intelligence & Cyber Risk Management in three Hype Cycles, which to us is further validating its continued impact and innovation in the cybersecurity space. Gartner defines Hype Cycles as a graphic representation of the maturity and adoption of technologies and applications. We believe this recognition highlights Cyble's role in helping organizations identify, assess, and mitigate digital threats across surface, deep, and dark web environments. DRPS, Threat Intelligence and Cyber Risk Management are critical for organizations seeking to proactively detect and respond to external threats, including brand impersonation, data leaks, account takeovers, and supply chain exposures. "We believe that being named in three Gartner Hype Cycle reports is a strong validation of our mission to empower organizations with actionable threat intelligence and comprehensive digital risk insights," said Beenu Arora, CEO and Co-founder of Cyble. Beenu further added, "As threat actors evolve and digital attack surfaces expand, our inclusion underscores Cyble's ability to deliver innovative, real-time, and scalable cybersecurity solutions across global markets." With a strong presence across North America, APAC, META, and ANZ, Cyble serves enterprises, government institutions, and critical infrastructure with advanced threat monitoring and rapid incident response capabilities. To know more, visit: Gartner is a registered trademark and service mark of Gartner Inc. and/or its affiliates in the U.S. and internationally, and Hype Cycle is a registered trademark of Gartner Inc. and/or its affiliates and are used herein with permission. All rights reserved. Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner's research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose. Logo: View original content: SOURCE Cyble View original content:

Cyble Recognized as a Sample Vendor in Three Gartner® Hype Cycle™ Reports for the Second Consecutive Year
Cyble Recognized as a Sample Vendor in Three Gartner® Hype Cycle™ Reports for the Second Consecutive Year

Cision Canada

time14-07-2025

  • Business
  • Cision Canada

Cyble Recognized as a Sample Vendor in Three Gartner® Hype Cycle™ Reports for the Second Consecutive Year

CUPERTINO, Calif., July 14, 2025 /CNW/ -- Cyble, a global leader in AI-native cybersecurity solutions is pleased to announce its recognition in three Gartner® reports: the Gartner Hype Cycle for Security Operations, 2025, Gartner Hype Cycle for Managed IT Services, 2025 and Hype Cycle for Cyber-Risk Management, 2025 (Interactive Version). Cyble has been listed as a Sample Vendor for Digital Risk Protection Services (DRPS), Threat Intelligence & Cyber Risk Management in three Hype Cycles, which to us is further validating its continued impact and innovation in the cybersecurity space. Gartner defines Hype Cycles as a graphic representation of the maturity and adoption of technologies and applications. We believe this recognition highlights Cyble's role in helping organizations identify, assess, and mitigate digital threats across surface, deep, and dark web environments. DRPS, Threat Intelligence and Cyber Risk Management are critical for organizations seeking to proactively detect and respond to external threats, including brand impersonation, data leaks, account takeovers, and supply chain exposures. "We believe that being named in three Gartner Hype Cycle reports is a strong validation of our mission to empower organizations with actionable threat intelligence and comprehensive digital risk insights," said Beenu Arora, CEO and Co-founder of Cyble. Beenu further added, "As threat actors evolve and digital attack surfaces expand, our inclusion underscores Cyble's ability to deliver innovative, real-time, and scalable cybersecurity solutions across global markets." With a strong presence across North America, APAC, META, and ANZ, Cyble serves enterprises, government institutions, and critical infrastructure with advanced threat monitoring and rapid incident response capabilities. To know more, visit: Gartner is a registered trademark and service mark of Gartner Inc. and/or its affiliates in the U.S. and internationally, and Hype Cycle is a registered trademark of Gartner Inc. and/or its affiliates and are used herein with permission. All rights reserved. Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner's research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.

DOWNLOAD THE APP

Get Started Now: Download the App

Ready to dive into a world of global content with local flavor? Download Daily8 app today from your preferred app store and start exploring.
app-storeplay-store