Cybersecurity and Information Warfare

Cybersecurity and Information Warfare

Chinese Salt Typhoon Breached U.S. Army Network for Nine Months

A recent DHS memo revealed that the Chinese-linked Salt Typhoon maintained unauthorized access to a U.S. Army National Guard network for nine months in 2024, stealing sensitive information and indicating long-term espionage strategies. This breach poses risks to critical infrastructure and highlights vulnerabilities that could similarly affect India’s defense systems, especially given its hybrid federal-state frameworks. The situation underscores the necessity for improved cybersecurity measures such as zero-trust architectures and enhanced protection of configuration data. This incident serve…
Share
Read More
Cybersecurity and Information Warfare

NVIDIA NeMo Curator vulnerability (CVE-2025-23307) enables code execution and privilege escalation.

NVIDIA has disclosed a high-severity vulnerability (CVE-2025-23307) in its NeMo Curator, which enables arbitrary code execution and privilege escalation across multiple platforms, posing significant risks to defense and critical infrastructure due to the reliance on AI in secure environments. The flaw, with a CVSS score of 7.8, allows attackers to potentially manipulate AI workflows and exfiltrate sensitive data. Urgent upgrades to version 25.07 are recommended to mitigate these risks, alongside enhanced security measures for AI data processing. This incident underscores the need for robust de…
Share
Read More
Cybersecurity and Information Warfare

CERT-In Enhances Cyber Readiness Advisories as of Aug 27

India’s national CERT-In has updated its public advisories list as of August 27, highlighting the ongoing emphasis on cyber readiness for critical sectors, especially smart city infrastructures. This update is significant as it reflects the government’s proactive approach to continuous threat preparedness, crucial for operators in energy, telecom, and finance sectors facing increasing cyber risks. The advisories serve as a vital coordination point for incident management and threat intelligence, ensuring that security teams within defense-linked supply chains can respond effectively to vulnera…
Share
Read More
Cybersecurity and Information Warfare

Critical RCE Vulnerability in Citrix NetScaler ADC/Gateway Requires Urgent Patching

A critical vulnerability (CVE-2025-7775) in Citrix NetScaler ADC and Gateway is under active exploitation, posing significant risks to defense contractors and government networks across APAC. This memory overflow flaw enables remote code execution and denial-of-service attacks, potentially compromising secure remote access and critical infrastructure. Urgent patching is recommended for affected versions, with immediate upgrades necessary for older branches. The widespread use of these systems heightens the threat of credential theft and persistent access in sensitive environments, necessitatin…
Share
Read More
Cybersecurity and Information Warfare

Indian Army launches Terrier Cyber Quest 2025 to enhance cyber defenses against emerging threats.

The Indian Army has launched Terrier Cyber Quest 2025, a national-level cyber challenge led by the Territorial Army with CyberPeace collaboration, to strengthen defenses against emerging threats spanning AI, ML, quantum, and drone technologies amid heightened regional cyber risk. Registration windows publicized by organizers indicate sign-ups running from July 23 to August 30, 2025, with events scheduled in August and on-ground finals hosted in New Delhi, underscoring an accelerated talent identification and capability-building timeline. The initiative features tracks such as Bug Hunting/CTF a…
Share
Read More
Cybersecurity and Information Warfare

Anthropic Thwarts Hackers Misusing Claude AI for Cybercrime

Anthropic has successfully thwarted hackers’ attempts to misuse its Claude AI model for cybercrime, including generating malicious code and phishing campaigns, which highlights the dual-use potential of AI technology. This situation raises significant concerns for defense sectors integrating AI into military systems, as adversaries could exploit similar tools to target critical infrastructure. In response, Anthropic is implementing enhanced monitoring and restrictions on model outputs to prevent harmful applications. The growing adoption of AI in defense emphasizes the need for robust access c…
Share
Read More
Cybersecurity and Information Warfare

Google alerts on China-backed hackers targeting diplomats in Southeast Asia.

Google has warned of a China-backed cyber-espionage campaign targeting diplomats in Southeast Asia, attributed to the hacking group UNC6384. The attacks involved compromising Wi-Fi networks to install malware disguised as software updates, threatening sensitive diplomatic data. This issue underscores the escalating cybersecurity tensions between the US and China, with Microsoft also identifying state-backed Chinese hackers exploiting software vulnerabilities. The situation reflects a broader concern regarding cyber threats against key global institutions, highlighting the need for enhanced cyb…
Share
Read More
Cybersecurity and Information Warfare

J&K government bans pen drives to improve cybersecurity measures.

The Jammu and Kashmir government has prohibited the use of pen drives on official devices to bolster cybersecurity and protect sensitive data. This directive aims to minimize risks of data breaches and malware infections, reflecting a strong commitment to data sovereignty. Additionally, it restricts the use of unsecured platforms for handling official materials. The move comes amid reports of significant cyberattacks on Indian websites, including those in J&K, highlighting the urgent need for enhanced cybersecurity measures. By allowing controlled whitelisting of pen drives in exceptional case…
Share
Read More
Cybersecurity and Information Warfare

AI Essential for Strengthening Cybersecurity in India

The ET World Leaders Forum 2025 highlighted the urgent need for businesses to leverage artificial intelligence (AI) to combat the rapid rise in cyberattacks in India, which now occur at a staggering rate of four incidents per minute. Experts noted that while bad actors exploit AI to enhance their attacks, there is a critical shortage of cybersecurity professionals in the country, with only 350,000 available against a demand for 1 million. The conversation stressed the importance of offensive strategies in cybersecurity, especially given the advanced capabilities of countries like China. It und…
Share
Read More
Cybersecurity and Information Warfare

Social Engineering Threats Rise Amid Ignored Security Alerts

The 2025 Unit 42 Global Incident Response Report by Palo Alto Networks highlights that identity-driven social engineering attacks are increasingly circumventing advanced security measures, with 60% resulting in data exposure. The report indicates that 13% of incidents stemmed from ignored security alerts, revealing significant vulnerabilities in awareness and operational processes, particularly in rapidly digitizing regions like India. Attackers exploit human factors and process gaps, with privileged accounts being prime targets. To combat this, the report advocates for the application of Zero…
Share
Read More
Cybersecurity and Information Warfare

Sebi Intensifies Action Against Cyber Fraud, Seeks State Support

The Securities and Exchange Board of India (Sebi) is intensifying efforts against rising cyber frauds affecting investors, seeking collaboration from state governments to enhance awareness and training. Chairman Tuhin Kanta Pandey highlighted the alarming increase in scams on social media platforms, where fraudsters impersonate experts to mislead investors. Sebi is actively monitoring and addressing misleading content, while stock exchanges are directed to take stringent actions against unauthorized schemes. This proactive stance aims to safeguard investor interests and maintain market integri…
Share
Read More
Cybersecurity and Information Warfare

Chinese developer sentenced to 4 years for cyberattacks on ex-employer.

David Lu, a Chinese software developer, has been sentenced to four years in prison in the US for executing cyberattacks on his former employer, Eaton Corporation, after his responsibilities were reduced. He introduced malicious code that caused server disruptions and blocked user access, resulting in over $360,000 in damages. Lu’s actions included creating a kill switch to lock out users post-termination and deleting colleagues’ profile settings. Despite his conviction, Lu maintains his innocence and is exploring appeal options. This case highlights significant cybersecurity risks posed by ins…
Share
Read More
Cybersecurity and Information Warfare

CISA warns of Interlock ransomware threats to India's critical infrastructure

U.S. authorities have issued warnings about the growing threat of Interlock ransomware to India’s critical infrastructure, particularly utilities, telecom, and healthcare. Attackers are exploiting unpatched SimpleHelp Remote Monitoring and Management tools to infiltrate third-party billing software providers, exposing vulnerabilities in the supply chain. The ransomware employs tactics such as targeting virtual machines and using a double extortion model, making it especially dangerous. To counter these risks, Indian operators are advised to enforce strict patching, adopt multi-factor authent…
Share
Read More
Cybersecurity and Information Warfare

Surge in Cyberattacks on India's Critical Infrastructure

India’s critical infrastructure is experiencing a significant surge in cyberattacks, particularly targeting financial and government sectors, with threats primarily emanating from Pakistan and China. Notable operations, including Cosmic Leopard, exploit existing vulnerabilities, prompting the Reserve Bank of India to advocate for improved cybersecurity measures. The rising threat landscape emphasizes concerns over cloud vulnerabilities and supply chain risks, leading to discussions on offensive cyber operations, which necessitate careful consideration of legal and ethical implications for nati…
Share
Read More
Cybersecurity and Information Warfare

AI-Enhanced Social Engineering Threatens India's Defense Sector

In 2025, social engineering attacks have become increasingly sophisticated, leveraging AI to enhance phishing and deepfake scams, particularly targeting defense sectors. The shortage of skilled cybersecurity professionals impacts 83% of Chief Information Security Officers (CISOs), weakening defenses against these threats. For India, such tactics from adversaries like Pakistan and China pose significant risks to military systems, underscoring the urgent need for enhanced training and AI-driven security measures. The evolving nature of these attacks highlights the critical importance of bolsteri…
Share
Read More
Cybersecurity and Information Warfare

Russia Expands Cyber Operations to Target Critical Infrastructure

Russia is expanding its cyber influence globally through operations facilitated by companies from the post-Soviet era, targeting critical infrastructure in nations supporting Ukraine. This strategy aligns with geopolitical alliances, notably with China and Iran, which could have implications for conflicts in South Asia, particularly involving India and its rivals. To counter these threats, defensive measures focusing on cloud-native solutions and AI are recommended, enhancing resilience through vulnerability assessments and predictive controls. The integration of these technologies forms a cru…
Share
Read More
Cybersecurity and Information Warfare

CERT-In alerts of critical Google Chrome RCE vulnerability; users must update immediately.

India’s CERT-In has issued a high-severity advisory regarding a Google Chrome vulnerability that could enable remote code execution, urging users to update to the latest versions across all major operating systems. This flaw poses significant risks, particularly for defense personnel and critical infrastructure, as it can be exploited through phishing and other malicious campaigns. The advisory emphasizes the importance of timely patching and general browser hygiene, such as limiting risky extensions and enhancing monitoring for unusual activities. Strengthening cybersecurity measures in the d…
Share
Read More
Cybersecurity and Information Warfare

CERT-In warns of critical Microsoft vulnerabilities for Indian firms

India’s national cyber agency, CERT-In, has issued a high-risk advisory regarding critical Microsoft vulnerabilities that could lead to significant operational disruptions for Indian enterprises, particularly within government and strategic sectors. The advisory warns of potential remote code execution and privilege escalation risks, urging organizations to promptly apply patches and enhance security measures such as multi-factor authentication. This alert is timely, given the escalating regional tensions and the increasing targeting of unpatched systems by adversaries. Effective incident re…
Share
Read More
Cybersecurity and Information Warfare

GMR Aero Academy Launches Cybersecurity Training Program

GMR Aero Academy, the training arm of GMR Group specializing in aviation and security, has officially launched the National Cyber Security Scholar Program on August 21 to bolster India’s cybersecurity defenses amid escalating threats to critical infrastructure and defense sectors. This 18-week, 160-hour instructor-led initiative, developed under the National Security Database platform in partnership with CERT-In and the Information Sharing and Analysis Centre, focuses on equipping emerging leaders with skills in threat detection, incident response, vulnerability assessment, ethical hacking, cy…
Share
Read More
Cybersecurity and Information Warfare

Pakistan's Mobile System Changes Fuel Cyberattack Concerns

Users in Pakistan reported unexpected changes to mobile systems, sparking fears of a coordinated cyberattack, potentially linked to state actors amid regional tensions. Anomalies included unauthorized app installations and unusual data usage patterns, prompting the Pakistan Telecommunication Authority to advise users on cybersecurity measures. This incident underscores vulnerabilities in Pakistan’s digital infrastructure, raising alarms about potential threats to critical systems, including defense communications. The situation highlights the need for bolstered cybersecurity frameworks and int…
Share
Read More
Cybersecurity and Information Warfare

US Navy Sailor Convicted for Leaking Classified Info to China

A US Navy sailor has been convicted of espionage for leaking classified information to Chinese intelligence, including details on naval exercises and missile systems. Stationed in Japan, the sailor received $15,000 for the information, compromising US operations in the Indo-Pacific. This incident highlights the escalating threat of Chinese espionage amid tensions in the South China Sea, prompting the Department of Defense to enhance counterintelligence measures. With multiple similar cases in recent years, experts warn that such breaches could diminish US technological superiority in military…
Share
Read More
Cybersecurity and Information Warfare

Indian government maintains TikTok ban, clarifies misinformation.

The Indian government has not unblocked TikTok, contrary to misleading reports suggesting otherwise. Official sources clarified that TikTok and other Chinese apps, initially banned in June 2020 following border clashes in Ladakh, remain blocked. The ban reflects India’s commitment to safeguarding national security and digital sovereignty amidst ongoing tensions with China. This decisive stance reinforces the government’s strategy to limit Chinese influence in the digital domain, ensuring that platforms posing potential risks to security are kept at bay. Overall, the government’s firm approach…
Share
Read More
Cybersecurity and Information Warfare

Cybercriminals Exploit GeoServer Flaw for Cryptomining Attacks

Recent reports highlight a critical vulnerability in GeoServer software, tracked as CVE-2024-36401, which cybercriminals are actively exploiting to deploy cryptomining malware and create IoT botnets. This vulnerability enables remote code execution, allowing attackers to install miners like XMRig on both cloud and on-premise systems, and facilitating multi-stage payloads that evade detection. The exploitation campaigns target high-value sectors such as energy and telecommunications, with tactics including disabling security features and establishing persistence through cron jobs. Researchers h…
Share
Read More
Cybersecurity and Information Warfare

Trojan 1337 Hacktivists Breach Punjab Assembly Website

The Indian hacktivist group Trojan 1337 has claimed responsibility for breaching the website of Pakistan’s Provincial Assembly of Punjab, highlighting a rise in nationalist cyberattacks in the region. This incident, occurring on August 19, 2025, echoes previous actions where the group targeted over 100 Bangladeshi sites during India’s Independence Day, indicating a trend of politically motivated cyber activities that may exacerbate diplomatic tensions. Such hacktivist actions raise concerns about the security of digital assets within institutions and reflect the ongoing rivalry and strategic…
Share
Read More
Cybersecurity and Information Warfare

India Trains Cyber Commandos to Tackle AI-Driven Cybercrime

India’s Ministry of Home Affairs is responding to the rising threat of AI-driven cybercrime by training specialized “cyber commandos” at the Defence Institute of Advanced Technology (DIAT) in Pune. This six-month course, developed in collaboration with DRDO scientists and academic experts, addresses challenges such as deepfakes and automated phishing. The initial cohort of 30 commandos, primarily from Jammu & Kashmir Police, has already been involved in key operations, although low pass rates among Maharashtra Police candidates indicate a need for enhanced training efforts. This initiative hig…
Share
Read More