Cybersecurity and Information Warfare

Cybersecurity and Information Warfare

Pentagon watchdog finds Hegseth's Signal use endangered US personnel safety.

The Pentagon’s inspector general found Defense Secretary Pete Hegseth at fault for using the Signal messaging app to relay sensitive information regarding military operations against Yemen’s Houthi militants, potentially endangering U.S. personnel. Although the report concluded Hegseth did not improperly declassify material, lawmakers raised concerns that his communications violated Pentagon policy regarding secure information sharing. The investigation ignited political scrutiny, with critics claiming such actions would lead to termination for lower-ranking officials. Hegseth defended his use…
Share
Read More
Cybersecurity and Information Warfare

Indian Air Force rescues 335 nationals from Sri Lanka amid cyclone.

The Indian Air Force successfully executed Operation Sagar Bandhu, evacuating 335 Indian nationals stranded in Sri Lanka due to Cyclone Ditwah, transporting them to Thiruvananthapuram on IL-76 and C-130J aircraft. This operation, which also involved the deployment of MI-17 V helicopters and special forces, underscored India’s commitment to providing timely humanitarian assistance in crisis situations. In addition to the evacuations, the Air Force airlifted nearly six tonnes of relief supplies and rescued 96 individuals, including children and critically injured persons, from various locations…
Share
Read More
Cybersecurity and Information Warfare

Government addresses GPS spoofing threat that disrupted 400 flights at major Indian airports.

The Indian government confirmed that multiple major airports, including Delhi, Mumbai, and Bengaluru, experienced GPS spoofing signals last month, although flight operations remained unaffected. Civil Aviation Minister Ram Mohan Naidu stated that contingency procedures were successfully employed, as conventional navigation systems ensured safe landings. The ministry highlighted ongoing reports of similar GPS interference and emphasized that advanced cybersecurity measures are being implemented to protect aviation networks from potential global cyber threats, including ransomware and malware. T…
Share
Read More
Cybersecurity and Information Warfare

India mandates SIM-linked messaging apps to enhance telecom security and combat cyber fraud.

On November 28, 2025, India implemented new regulations through the Department of Telecommunications (DoT) that require messaging applications like WhatsApp, Telegram, and Signal to be used only on devices containing an active Subscriber Identity Module (SIM) card, effectively ending the era of spare-phone usage for many users. This directive mandates that these apps must continuously link to the installed SIM, leading to forced logouts of web services every six hours and requiring re-authentication via QR codes. Additionally, the government ordered major smartphone manufacturers to preload th…
Share
Read More
Cybersecurity and Information Warfare

Quick Heal Technologies wins Rs 64 crore cybersecurity contract from NFSU-RIC.

Quick Heal Technologies has secured a Rs 64-crore cybersecurity contract from the National Forensic Sciences University – Research and Innovation Centre (NFSU-RIC), emphasizing its commitment to providing comprehensive security solutions to government institutions. The contract, valid for five years, reinforces Quick Heal’s strategic engagement in the cybersecurity sector, where it delivers AI-powered solutions across various segments. The company’s financial performance has also shown significant improvement, with a 90.6% rise in net profit and a 13.65% increase in revenue for Q2 FY26 compare…
Share
Read More
Cybersecurity and Information Warfare

Albiriox Malware Targets Android Users, Enabling Total Device Control

A new Android malware, Albiriox, has emerged, posing significant risks to users by granting attackers complete control over infected devices through advanced remote access capabilities. Identified by Cleafy researchers, the malware operates as a Malware-as-a-Service, allowing criminals to execute on-device fraud while bypassing security measures like two-factor authentication. Albiriox employs a deceptive two-stage infection process, initially targeting users with fraudulent applications and utilizing sophisticated evasion techniques to remain undetected. With a focus on financial applications…
Share
Read More
Cybersecurity and Information Warfare

OAST Tool Exploits 200 CVEs via Google Cloud for Major Attacks

A sophisticated threat actor has leveraged a private Out-of-band Application Security Testing (OAST) service hosted on Google Cloud to conduct large-scale attacks targeting over 200 CVEs, primarily focusing on Canary Systems in Brazil. Researchers from VulnCheck noted approximately 1,400 exploit attempts, employing modified Nuclei templates and custom Java payloads to probe vulnerabilities, including a notable remote code execution flaw in Ivanti Endpoint Manager Mobile. Utilizing Google Cloud infrastructure, the attackers can blend malicious activities with legitimate traffic, complicating de…
Share
Read More
Cybersecurity and Information Warfare

VPN services suspended in Rajouri for two months due to security threats.

Authorities in Jammu and Kashmir’s Rajouri district have suspended all Virtual Private Network (VPN) services for two months, citing security concerns and public safety. District Magistrate Abhishek Sharma issued the directive under Section 163 of the Bhartiya Nagarik Suraksha Sanhita following alarming reports from Senior Superintendent of Police Gaurav Sikarwar regarding suspicious use of VPNs to facilitate unlawful activities. The order aims to prevent the potential misuse of these platforms for anti-national purposes, including the dissemination of inflammatory content and coordination of…
Share
Read More
Cybersecurity and Information Warfare

Pakistan exploits AI deep fakes of Indian leaders to spread misinformation.

Pakistan has increasingly resorted to AI-generated deep fake videos to disseminate misinformation about Indian military leaders, including recent fabricated clips featuring Admiral Dinesh K. Tripathi and General Upendra Dwivedi. These videos, aimed at undermining India’s military credibility and inciting unrest, coincided with Pakistan’s test of a new anti-ship ballistic missile, during which exaggerated claims of their naval capabilities were circulated. Despite India’s undisputed naval superiority and successful military operations, the emergence of such deceptive tactics underscores a new d…
Share
Read More
Cybersecurity and Information Warfare

Government mandates WhatsApp to enforce SIM binding and session logout every six hours.

The Union government of India has mandated that messaging platforms like WhatsApp enforce SIM binding, requiring users to have the SIM card used for registration in their device, and to log out of web sessions every six hours, effective February 2026. This directive aims to enhance traceability of cyber fraud linked to international misuse of SIMs, a growing concern for authorities. Critics argue that the measures may not effectively deter fraudsters and represent an overreach of regulatory authority, potentially impacting a wide range of digital services that rely on telecommunications identi…
Share
Read More
Cybersecurity and Information Warfare

Amazon alerts 300 million users about Black Friday impersonation scams targeting personal data.

Amazon has issued a warning to its over 300 million users regarding a surge in Black Friday impersonation scams aimed at compromising personal data. These scams involve deceptive alerts, fake browser notifications, and counterfeit websites that mimic delivery issues to pilfer users’ credentials and financial information. According to FortiGuard Labs, there are over 700 harmful domains linked to these scams, while Darktrace reported a staggering 620% increase in phishing attempts, with Amazon being the target in 80% of cases. The situation underscores the critical need for consumer vigilance du…
Share
Read More
Cybersecurity and Information Warfare

Cyclone Ditwah devastates Sri Lanka; India responds with humanitarian aid.

Cyclone Ditwah has wreaked havoc across Sri Lanka, leading to the declaration of a state of emergency as the death toll has risen to at least 132, with 176 individuals still missing amid widespread destruction of homes and displacement of approximately 78,000 people. The cyclone’s impact is compounded by the aftermath of another severe weather system, Senyar, which has affected neighboring Thailand and Malaysia, resulting in over 300 fatalities across the region. The Sri Lankan government has sought international aid, prompting a swift response from India, which has dispatched relief supplies…
Share
Read More
Cybersecurity and Information Warfare

Minister Ashwini Vaishnaw visits ASCCE to enhance India-Singapore cyber cooperation.

India’s Minister for Railways, Information & Broadcasting, and Electronics & Technology, Ashwini Vaishnaw, visited the ASEAN-Singapore Cybersecurity Centre of Excellence (ASCCE) to strengthen bilateral cyber cooperation amid growing regional cyber threats. The meeting involved discussions on Singapore’s comprehensive cybersecurity frameworks, highlighting the significance of a multi-layered approach to safeguard critical infrastructure. Both nations exchanged insights on cyber policy development and operational collaboration, reaffirming their commitment to enhance digital resilience and stabi…
Share
Read More
Cybersecurity and Information Warfare

Quantum advancements threaten encryption; firms must adopt post-quantum cryptography urgently.

Palo Alto Networks CEO Nikesh Arora has warned that quantum computing advancements may soon render current encryption methods obsolete, with significant implications for data security across various sectors. While nations like the US, China, and India are actively pursuing quantum technologies, security experts stress the urgency for businesses to transition to post-quantum cryptography (PQC) to safeguard sensitive data. Arora predicts this shift could occur by 2029, yet some analysts caution that immediate threats from AI may warrant prioritization over speculative quantum risks. As the quant…
Share
Read More
Cybersecurity and Information Warfare

Kovind Highlights Need to Protect India's Cybersecurity Infrastructure

Former President Ram Nath Kovind launched Lisianthus Technologies’ “Critical Infrastructure Cyber Threat Review 2025” at the Cyber Shikshit Bharat workshop, emphasizing the growing importance of cybersecurity as a national security pillar amidst rising cyberattacks. The report indicates that India faced approximately 2.27 million cybercrime cases in 2024, with projections exceeding 2.5 million in 2025, leading to significant financial losses, particularly from investment scams. Kovind highlighted the necessity for heightened cyber awareness among citizens and institutions, citing that human er…
Share
Read More
Cybersecurity and Information Warfare

PM Modi to visit Jordan and Oman in December for economic ties.

Prime Minister Modi is expected to visit Jordan and Oman in December to strengthen economic and strategic ties, including the anticipated signing of a Comprehensive Economic Partnership Agreement (CEPA) with Oman. This visit will address India’s role in the India-Middle East-Europe Economic Corridor (IMEC) and emphasize cooperation in defense, trade, and regional stability, particularly in light of ongoing discussions regarding the Gaza situation. Both countries have expressed support for India’s stance against terrorism, with Oman being a pivotal defense partner, facilitating joint military…
Share
Read More
Cybersecurity and Information Warfare

India poised to become a superpower by 2047, says ex-ISRO chief.

Former ISRO Chairman S. Somnath expressed strong confidence that India will achieve superpower status by 2047, driven by advancements in space technology and manufacturing. Speaking at the 71st convention of the Akhil Bharatiya Vidyarthi Parishad (ABVP) on November 29, 2025, Somnath highlighted the synergy of science and spirituality, India’s youthful demographic (25% of the population), and democratic stability as key enablers of progress. He commended Prime Minister Narendra Modi’s recent historic reform announced on November 27, 2025, which opens the nuclear energy sector to private compani…
Share
Read More
Cybersecurity and Information Warfare

DoT confirms TCS Rules, 2025, enhance India's telecom cyber resilience.

The Department of Telecommunications (DoT) reaffirmed that the amended Telecommunication Cyber Security (TCS) Rules, 2025, notified on October 22, remain enforceable despite an inadvertent republication of the rules on October 29, which has since been rescinded. These amendments aim to enhance India’s cyber resilience and address vulnerabilities associated with the integration of telecom identifiers in digital services such as banking and e-commerce. Key provisions include the establishment of a Mobile Number Validation (MNV) platform to prevent identity fraud and the requirement for resale en…
Share
Read More
Cybersecurity and Information Warfare

Rockwell Automation launches SecureOT suite to enhance industrial cybersecurity in India.

Rockwell Automation has launched its SecureOT solution suite, aimed at enhancing industrial cybersecurity for manufacturers and critical infrastructure in India, amidst rising cyber threats targeting operational technology (OT) systems. As industries increasingly adopt AI and connected systems, the need for a robust cybersecurity framework is emphasized by the managing director of Rockwell Automation India, Dilip Sawhney, who aligns this initiative with India’s Make in India vision. The SecureOT suite integrates real-time asset visibility, vulnerability management, and 24/7 monitoring, support…
Share
Read More
Cybersecurity and Information Warfare

India warns of AI-generated fake videos targeting Army Chief by Pakistani sources.

India’s Press Information Bureau (PIB) has flagged a series of AI-generated fake videos targeting Army Chief General Upendra Dwivedi, disseminated by Pakistani propaganda accounts. These doctored clips falsely portray the Army Chief making inflammatory statements regarding sensitive geopolitical issues, such as the alleged custodial death of climate activist Sonam Wangchuk and territorial concessions to China. PIB has reiterated the importance of relying on verified and official sources for information, emphasizing that such disinformation campaigns aim to undermine public trust in national in…
Share
Read More
Cybersecurity and Information Warfare

IIT Kanpur to enhance Army cyber defense training through partnership.

The Indian Army’s Central Command has partnered with IIT Kanpur’s C3iHub to enhance its cybersecurity capabilities through a new Memorandum of Understanding. This initiative aims to provide structured training to Army personnel in advanced cyber defence strategies, focusing on emerging threats and incident response frameworks essential for securing military networks. The training modules, developed by C3iHub, will expose personnel to global best practices in cyber defence, thereby strengthening the Army’s operational readiness in the digital domain. This collaboration represents a significan…
Share
Read More
Cybersecurity and Information Warfare

Shai-Hulud v2 supply chain attack spreads to Maven, exposing thousands.

The Shai-Hulud v2 supply chain attack has expanded to the Maven ecosystem, compromising over 830 npm packages and embedding malicious components in the org.mvnpm:posthog-node:4.18.1 package. This iteration is more stealthy and destructive, allowing attackers to gain unauthorized access to developer accounts and publish trojanized packages, affecting over 28,000 repositories. By exploiting CI misconfigurations, the malware amplifies its impact, leveraging a single compromised account to spread rapidly. Experts warn that this attack underscores vulnerabilities in the software supply chain, empha…
Share
Read More
Cybersecurity and Information Warfare

AI Tools Are Empowering State-Sponsored Cybercriminals, Raising Security Concerns.

A recent report by Anthropic detailed a sophisticated cyber-espionage scheme believed to be backed by the Chinese government, employing AI tools like Claude Code to automate hacking tasks. This operation highlights a troubling trend where generative AI is being exploited by state-sponsored hackers and criminal networks to enhance their cyber capabilities, creating a digital arms race. As AI models can quickly identify and exploit vulnerabilities, they pose a significant threat to cybersecurity, potentially granting criminals an upper hand. The dual-use nature of AI underscores the urgent need…
Share
Read More
Cybersecurity and Information Warfare

DoT warns SIM card users about legal consequences of misuse.

The Department of Telecom (DoT) has issued a crucial advisory warning mobile subscribers about potential legal repercussions if their registered SIM cards are misused for illegal activities, such as fraud or impersonation. This advisory comes amid rising instances of cybercrime facilitated by SIM cards acquired through fraudulent means or borrowed from unwitting individuals. The DoT emphasizes the importance of vigilance regarding devices linked to one’s identity and outlines strict legal penalties, including imprisonment and substantial fines, for tampering with telecom identifiers. To mitiga…
Share
Read More
Cybersecurity and Information Warfare

CISA warns of advanced spyware threats targeting secure messaging apps.

The Cybersecurity and Infrastructure Security Agency (CISA) has issued a warning about sophisticated spyware attacks targeting messaging applications, particularly those used by senior government officials, military leaders, and civil society executives. Cyber actors have employed advanced techniques, such as zero-click malware and fraudulent app upgrades, to gain unauthorized access to victims’ devices, thereby compromising sensitive information. CISA’s alert underscores the growing concerns over the prevalence of such attacks, particularly against encrypted messaging services like Signal. Th…
Share
Read More
Enable Notifications OK No thanks