Cybersecurity and Information Warfare

Cybersecurity and Information Warfare

Cert-In shifts cybersecurity audits to focus on threat preparedness

The Indian Computer Emergency Response Team (Cert-In) has introduced new cybersecurity audit guidelines that shift focus from compliance to continuous threat preparedness. This framework mandates comprehensive coverage of an organization’s ICT structure, requiring top management to take ownership of cybersecurity programs. With a growing reliance on digital infrastructure, sectors like banking, telecom, and healthcare will face immediate impacts, emphasizing the need for robust security measures. The guidelines aim to enhance national cybersecurity readiness, aligning with the increasing fre…
Share
Read More
Cybersecurity and Information Warfare

India Strengthens Cybersecurity to Combat Online Threats

The Indian government continues to bolster its cybersecurity framework to counter AI-powered deepfakes and evolving cyber threats, underscoring its commitment to digital safety. On August 8, 2025, Union Minister Jitin Prasada reaffirmed that laws including the Information Technology Act, 2000, the Digital Personal Data Protection Act, 2023, and the Bharatiya Nyaya Sanhita, 2023 form a comprehensive legal foundation against identity theft, privacy violations, and misinformation. The government has also issued advisories mandating digital platforms to remove synthetic and misleading content and…
Share
Read More
Cybersecurity and Information Warfare

India's New Cyber Warfare Doctrine Enhances Defense Capabilities

India has unveiled a new cyber warfare doctrine, termed the “digital Brahmastra,” which allows for offensive cyber operations without a no first use policy. This proactive strategy, announced by CDS General Anil Chauhan, emphasizes real-time counterattacks to enemy cyber threats, targeting critical systems such as radars, satellites, and communication networks. With an established Unified Cyber Command, India aims to respond swiftly to any cyber aggression, marking a significant shift in its defense capabilities against adversaries like China and Pakistan, who have previously employed cyberatt…
Share
Read More
Cybersecurity and Information Warfare

Indian Armed Forces Enhance Cybersecurity through Private Partnerships

The Indian Armed Forces have recently enhanced their cybersecurity framework with the formal release of the Joint Doctrine for Cyberspace Operations, unveiled by Chief of Defence Staff Gen Anil Chauhan during the Chiefs of Staff Committee meeting on August 7, 2025. This doctrine establishes a comprehensive, unified approach to protecting national cyberspace interests by integrating offensive and defensive cyber capabilities across the Army, Navy, and Air Force. Emphasizing real-time intelligence integration, threat-informed planning, and resilience building, it marks a strategic shift towards…
Share
Read More
Cybersecurity and Information Warfare

Strengthening India's Cybersecurity: Insights from Secure Bharat Mission

The Secure Bharat Mission, held in association with Zscaler, emphasized the critical need for enhanced cybersecurity in India amid an increasingly complex threat landscape, which includes AI-driven attacks. Key speakers highlighted India’s status as the second-most attacked nation globally, advocating for a Zero Trust architecture to safeguard digital services. The event underscored the importance of transitioning from outdated security frameworks and urged collaboration between government and industry to reinforce cyber resilience. Participants agreed on the necessity of continuous updates to…
Share
Read More
Cybersecurity and Information Warfare

Microsoft's Project Ire: AI Tool for Automated Malware Detection

Microsoft has launched Project Ire, an AI-powered system that autonomously reverse-engineers software to identify malware without human intervention, boasting a 98% accuracy rate in detecting threats. As part of its Secure Future Initiative, this advanced security tool automates traditional malware classification processes, enhancing threat detection capabilities amid increasing cyber risks. Microsoft’s focus on AI-driven cybersecurity solutions reflects a broader industry trend to combat emerging threats effectively, positioning the company as a leader in innovative defense mechanisms against…
Share
Read More
Cybersecurity and Information Warfare

Infosys launches AI, cybersecurity, and space tech center in Hubballi.

Infosys has launched a centre for Advanced AI, Cybersecurity, and Space Technology in Hubballi, North Karnataka, significantly enhancing the region’s tech landscape. This initiative aims to create employment opportunities while fostering innovation through collaboration with local institutions and hiring talent from engineering colleges. The establishment of this hub is a strategic move to position Hubballi as a key player in the tech ecosystem, responding to local government expectations for growth in the area. With a focus on AI-driven solutions, Infosys is committed to regional development…
Share
Read More
Cybersecurity and Information Warfare

DRDO Guest House Manager Detained for Espionage in Jaisalmer

In Jaisalmer, Mahendra Prasad, manager of the DRDO guest house, has been detained for suspected espionage, raising serious concerns about security at sensitive military sites. Reports indicate he may have shared information with Pakistan, having received suspicious communications since 2020. His detention follows a trend of espionage arrests in Rajasthan, highlighting the increasing vigilance of Indian Intelligence agencies along the border. The situation underscores the vulnerability of India’s strategic military installations, prompting heightened surveillance to safeguard national security…
Share
Read More
Cybersecurity and Information Warfare

Microsoft's SharePoint Hack Reveals Risks of Foreign Management

Microsoft disclosed that Chinese state-sponsored hackers exploited vulnerabilities in its SharePoint software, impacting numerous US agencies, including critical security departments. Notably, it was revealed that China-based engineers had long been maintaining the compromised software, raising significant security concerns over foreign access to sensitive systems. Cybersecurity experts emphasize the risks posed by allowing foreign personnel to manage vital US government infrastructure, especially given China’s extensive data collection laws. This incident has prompted US lawmakers to demand t…
Share
Read More
Cybersecurity and Information Warfare

Cloudflare accuses Perplexity of evading web access restrictions.

Cybersecurity firm Cloudflare accused AI company Perplexity, led by IIT Madras alumnus Arvind Srinivas, of employing stealth crawling techniques to bypass website restrictions, including using undeclared user agents and IP rotation to access blocked content. Perplexity defended itself, asserting it provides real-time summaries for user queries rather than storing data, challenging Cloudflare’s characterization of its operations as malicious. The dispute highlights the tension between web crawlers and content providers, with Cloudflare responding to customer complaints about unauthorized acce…
Share
Read More
Cybersecurity and Information Warfare

Google's AI Big Sleep uncovers 20 flaws in open-source software

Google’s AI-powered vulnerability researcher, Big Sleep, has successfully identified 20 security flaws in widely used open-source software, including tools like FFmpeg and ImageMagick. This initiative, developed by Google’s DeepMind and Project Zero teams, emphasizes augmenting human security researchers rather than replacing them, allowing for thousands of tests to be conducted rapidly. The AI operates by simulating malicious actions to probe code and network services for potential exploits, with human experts reviewing findings before submission. This advancement showcases the growing role o…
Share
Read More
Cybersecurity and Information Warfare

Kashmir's youth exploit social media for profit, raising concerns

In recent days, security agencies in Kashmir have uncovered a growing trend where some local youth exploit social media by posting provocative images and content glorifying separatist figures—most notably Burhan Wani, a slain Hizbul Mujahideen commander—not out of ideological conviction but as a calculated strategy for profit. Investigations following the detention of several individuals revealed that these youth deliberately used inflammatory visuals to attract followers, rapidly expanding their online reach. Once a substantial following was secured, they shifted content toward more neutr…
Share
Read More
Cybersecurity and Information Warfare

China's export restrictions threaten US military tech supply chains.

China’s export restrictions on critical minerals like rare earths and gallium are significantly impacting US defense production by causing delays and increased costs. With China dominating global refining, the Pentagon is facing supply chain vulnerabilities that could undermine its military readiness. Although the US is seeking new mining investments and alternative supply deals, these efforts are unlikely to fill the gap swiftly, leaving Washington exposed. This situation underscores the strategic importance of securing mineral resources, enhancing India’s defense strategies by highlighting t…
Share
Read More
Cybersecurity and Information Warfare

BSF to analyze Chinese drone found near India-Bangladesh border

The Border Security Force (BSF) is set to analyze a Chinese-made drone discovered near the India-Bangladesh border in Tripura. Found by a local boy, the drone, which has two high-resolution cameras and weighs 915 grams, will undergo forensic examination before being handed over to the BSF for a comprehensive study. This incident highlights ongoing security concerns, particularly given the heightened vigil along the border following internal unrest in Bangladesh. The BSF’s proactive measures, including intensified surveillance, aim to mitigate risks from cross-border crimes and infiltrations, e…
Share
Read More
Cybersecurity and Information Warfare

China demands Nvidia prove chip security to regain trust.

China’s state media has called for Nvidia to provide “convincing security proofs” regarding its chips, particularly following concerns over potential backdoor risks associated with its H20 AI chip. The commentary from People’s Daily emphasizes that foreign companies must align with Chinese laws to regain market trust after a recent US export ban was lifted. Nvidia reassured that its chips do not contain backdoors, underscoring its commitment to cybersecurity. This situation highlights the ongoing tensions between the US and China over technology and security, reflecting China’s cautious stance…
Share
Read More
Cybersecurity and Information Warfare

Ransomware complexity surges in APAC, urging stronger defenses

The Akamai SOTI report highlights a concerning rise in ransomware attacks in the Asia Pacific (APAC) region, with an alarming shift towards quadruple extortion tactics, which now include DDoS attacks and pressure on third parties. Critical sectors like healthcare and legal services are particularly vulnerable, with major groups like LockBit and emerging players targeting these industries. The report underscores the need for robust cyber defenses, such as Zero Trust architectures and microsegmentation, to combat evolving threats. The fragmented regulatory landscape further complicates complianc…
Share
Read More
Cybersecurity and Information Warfare

US Defense Bill Targets Apple Display Supplier BOE Over Security Risks

On August 2, 2025, momentum built in Washington as the latest U.S. National Defense Authorization Act advanced proposals to scrutinize BOE Technology Group, a key Apple display supplier, for potential ties to the Chinese military. The bill, approved by congressional committees in July and expected to become law later this year, instructs the Pentagon to assess whether BOE should be classified as a Chinese military company. Though this designation would not immediately disrupt BOE’s commercial relationships, it could bar the company from the U.S. military supply chain and intensify pressure o…
Share
Read More
Cybersecurity and Information Warfare

China Accuses US of Using Microsoft Bugs for Military Espionage

China has accused the US of exploiting flaws in Microsoft email servers to conduct cyberattacks on its military, claiming that US actors were linked to significant breaches affecting defense sector companies. This allegation follows a history of reciprocal accusations, with the US frequently attributing cyber incidents to China. While both nations engage in offensive cyber operations, China’s public attribution strategy appears aimed at influencing international discourse on cybersecurity, particularly regarding Taiwan. This ongoing cyber rivalry highlights the complexities of modern geopoliti…
Share
Read More
Cybersecurity and Information Warfare

China Accuses US of Using Microsoft Bugs for Military Espionage

China has accused the US of exploiting flaws in Microsoft email servers to conduct cyberattacks on its military, claiming that US actors were linked to significant breaches affecting defense sector companies. This allegation follows a history of reciprocal accusations, with the US frequently attributing cyber incidents to China. While both nations engage in offensive cyber operations, China’s public attribution strategy appears aimed at influencing international discourse on cybersecurity, particularly regarding Taiwan. This ongoing cyber rivalry highlights the complexities of modern geopoliti…
Share
Read More
Cybersecurity and Information Warfare

Nvidia denies chip 'backdoors' amid China's security concerns

Nvidia has denied the existence of “backdoors” in its chips amidst China’s scrutiny over security concerns, particularly regarding its H20 AI processing units. The US tech giant confirmed it would resume H20 sales to China following the easing of export restrictions by Washington. However, China’s Cyberspace Administration has summoned Nvidia to address potential security vulnerabilities. This situation reflects broader US-China trade tensions, with China promoting its domestic 910C chip as an alternative, potentially undermining reliance on foreign technology. Ultimately, Nvidia’s commitmen…
Share
Read More
Cybersecurity and Information Warfare

Nvidia denies chip 'backdoors' amid China's security concerns

Nvidia has denied the existence of “backdoors” in its chips amidst China’s scrutiny over security concerns, particularly regarding its H20 AI processing units. The US tech giant confirmed it would resume H20 sales to China following the easing of export restrictions by Washington. However, China’s Cyberspace Administration has summoned Nvidia to address potential security vulnerabilities. This situation reflects broader US-China trade tensions, with China promoting its domestic 910C chip as an alternative, potentially undermining reliance on foreign technology. Ultimately, Nvidia’s commitmen…
Share
Read More