Cybersecurity and Information Warfare

Cybersecurity and Information Warfare

Cyber Attack Disrupts 80% of Pakistan's Internet and Military Systems

A significant cyber attack on August 19, 2025, disrupted nearly 80% of Pakistan’s internet capacity for several hours, employing highly sophisticated methods that crippled communications and affected critical infrastructure, including military servers, amid escalating regional tensions. The incident, potentially linked to earlier ransomware assaults like the Blue Locker variant that targeted Pakistan Petroleum Limited on August 6, 2025, encrypting systems and deleting backups, has prompted urgent warnings from Pakistan’s National Cyber Emergency Response Team to …

Share
Read More
Cybersecurity and Information Warfare

U.S. Army urges industry to create interoperable edge tech

The U.S. Army emphasizes the need for interoperable, off-the-shelf technology to enhance its modernization efforts, particularly for its Next Generation Command and Control initiative. Lt. Gen. Maria Barrett advocates for modular, platform-independent capabilities that can function effectively at the tactical edge, especially in challenging environments. This approach aims to reduce technical debt and improve operational flexibility, allowing commanders to adapt quickly on the battlefield. Barrett stresses the importance of designing systems with real-world scenarios in …

Share
Read More
Cybersecurity and Information Warfare

Microsoft Limits Chinese Access to Cybersecurity System

Microsoft has announced a reduction in access for Chinese companies to its cyber early warning system, a move driven by concerns over pervasive Chinese cyber operations and vulnerabilities potentially being exploited against U.S. and allied interests. This decision follows significant cyber incidents linked to Chinese hackers, including breaches of critical U.S. infrastructure, prompting the tech giant to limit information sharing with entities that may aid China’s government. The restriction, while aimed at bolstering cybersecurity for …

Share
Read More
Cybersecurity and Information Warfare

Microsoft limits Chinese access to cyber warning system amid hacking concerns.

Microsoft has restricted Chinese access to its cyber early warning system amid speculation that Beijing is linked to a hacking campaign. This move highlights increasing concerns about cybersecurity threats emanating from China, reinforcing the importance of protecting sensitive information and infrastructure from potential cyber espionage. By limiting access to critical systems, Microsoft aims to enhance security protocols and safeguard its users against external threats. This action reflects a broader trend of countries and companies taking …

Share
Read More
Cybersecurity and Information Warfare

India Faces Rising Cyber Intrusions from China and Pakistan

Recent discussions among cybersecurity experts in India have highlighted a troubling rise in cyber intrusions from adversaries such as China and Pakistan, with a staggering 138% increase in cyberattacks on Indian government entities reported by the Center for Strategic and International Studies (CSIS) from 2019 to 2023. Notably, incidents surged from 85,797 to 204,844, illustrating a significant escalation in threats against India’s governmental infrastructure. Experts call for urgent enhancements in India’s digital security framework, emphasizing …

Share
Read More
Cybersecurity and Information Warfare

India Launches National Cybersecurity Bootcamp for Defense Training

India is launching the National Cyber Security Scholar Programme (NCSSP) 2025, an innovative cybersecurity bootcamp aimed at training future cyber defenders. Organized by CERT-IN and ISAC, this four-day immersive program in Hyderabad will simulate off-grid conditions, encouraging participants from varied fields such as IAS, IPS, and tech firms to engage in hands-on exercises like hardware hacking and RF jamming. This initiative reflects a strategic shift in India’s cybersecurity approach, emphasizing readiness against complex cyber threats …

Share
Read More
Cybersecurity and Information Warfare

Royal Enfield Faces Ransomware Attack Compromising Systems

Royal Enfield, the prominent Indian motorcycle manufacturer, has been hit by a ransomware attack that fully compromised its systems, with hackers claiming to have encrypted all servers and erased backups on August 12, 2025. The attackers issued a 12-hour deadline for an undisclosed ransom payment, threatening to auction stolen data through private bids via platforms like qTox and Telegram if demands were unmet, and hinted at releasing proof-of-access samples to pressure the company. Based in …

Share
Read More
Cybersecurity and Information Warfare

Google warns of AI-driven prompt injections stealing passwords.

Google has issued a warning about a new cybersecurity threat involving AI-powered prompt injections, where hackers manipulate AI systems to steal user information, particularly targeting its AI assistant, Gemini. This technique, termed “indirect prompt injection,” allows attackers to embed harmful prompts in benign content, deceiving AI into acting against its own protocols. As more users rely on AI for personal tasks, the risks of such sophisticated scams are increasing. Google is enhancing protective measures and …

Share
Read More
Cybersecurity and Information Warfare

CRPF warns personnel of fake app jeopardizing sensitive data

The Central Reserve Police Force (CRPF) has issued an alert to its 3.25 lakh personnel regarding a fraudulent mobile app named ‘Sambhav Application Writer’ that mimics its official application. This unauthorized app poses serious security risks by attempting to collect sensitive personal and organizational information from CRPF staff. The CRPF has urged all units to inform their personnel about this threat and ensure compliance with the advisory, emphasizing the importance of operational security. The original …

Share
Read More
Cybersecurity and Information Warfare

Horizon3.ai appoints CFO to drive growth in cybersecurity sector

Horizon3.ai, a cybersecurity startup integrating military intelligence with Silicon Valley expertise, has appointed Holly Grey as CFO to enhance its operational capabilities amid increasing cyber threats. The company has reported remarkable growth, achieving 101% year-over-year revenue increase and raising substantial funding to support its mission of leveraging AI in threat identification. CEO Snehal Antani emphasizes the importance of cybersecurity across all organizational functions, particularly concerning third-party vendors. The emphasis on a trust-based culture is critical, …

Share
Read More
Cybersecurity and Information Warfare

ZALA GEOCOSMOS: Independent Communication and Navigation System

The ZALA company recently unveiled its innovative ZALA GEOCOSMOS communication and navigation system at the Unmanned Systems forum in Moscow. This new technology is designed to operate independently of satellites and mobile networks, enhancing the reliability of aviation systems even in adverse conditions. By utilizing ground-based software-defined systems and onboard equipment, ZALA GEOCOSMOS enables secure communication and accurate location tracking for both unmanned and manned aircraft in a shared airspace. This advancement not only addresses …

Share
Read More
Cybersecurity and Information Warfare

Google Reinstates In-Person Interviews to Combat AI Cheating

Google is reinstating in-person interviews due to rising concerns over candidates using AI tools to cheat during virtual assessments, with over 50% reportedly relying on such technologies. CEO Sundar Pichai emphasized the importance of verifying candidates’ fundamental skills through face-to-face interaction, echoing similar moves by companies like McKinsey and Deloitte. The issue extends beyond interviews, as the FBI warns of sophisticated AI-enabled scams in recruiting, including fake profiles from North Korean nationals. This shift reflects …

Share
Read More
Cybersecurity and Information Warfare

SIT files 2,500-page chargesheet against Jyoti Malhotra for espionage

Following a three-month investigation, Haryana Police’s Special Investigation Team has filed a 2,500-page chargesheet in a Hisar court against YouTuber Jyoti Malhotra on charges of espionage for Pakistan. Malhotra, who ran the channel “Travel with Jo” and was arrested in mid-May 2025, faces allegations of sharing sensitive information with Pakistani intelligence operatives, including those from the ISI, and maintaining close contact with Ehsan-ur-Rahim (alias Danish), a staffer at the Pakistan High Commission in New Delhi …

Share
Read More
Cybersecurity and Information Warfare

PIB Debunks Deepfake Claiming IAF Chief Admitted Losses

A former Israeli Defense Forces (IDF) military intelligence chief has sparked renewed controversy by stating on Israel’s Channel 12 that the high Palestinian death toll in Gaza is “necessary for future generations.” The remarks, broadcast on August 15, 2025, have drawn sharp condemnation from international human rights groups and diplomats, who argue that such rhetoric risks normalizing civilian casualties amid escalating violence. The statement comes as Israeli operations in Gaza intensified over the past two …

Share
Read More
Cybersecurity and Information Warfare

WhatsApp accuses Russia of blocking secure communication services

WhatsApp has accused the Russian government of attempting to block secure communication for millions of users by restricting calls via its platform and Telegram, amid Russia’s push for state-controlled social media alternatives. WhatsApp argues that its end-to-end encryption is crucial for protecting users’ rights, while Telegram claims to combat harmful content with AI tools. The Russian government is promoting a new app, MAX, which raises concerns about user privacy and surveillance. This situation reflects Russia’s …

Share
Read More
Cybersecurity and Information Warfare

India Enhances Cybersecurity with Expanded SBOM Framework for Imports

India is enhancing its cybersecurity measures by expanding its Software Bill of Materials (SBOM) framework to detect hidden threats in imported technology, crucial for critical sectors like defense and infrastructure. With rising global supply chain vulnerabilities, CERT-In has introduced guidelines mandating a comprehensive inventory of software components, further extending to Cryptographic, AI, Quantum, and Hardware Bills of Materials. This proactive approach aligns with global Zero Trust principles, enabling continuous updates and a transparent digital asset …

Share
Read More
Cybersecurity and Information Warfare

Expert: Weak passwords can be cracked in under 3 minutes.

A cybersecurity expert warns that weak passwords can be cracked in under three minutes, with many individuals still using easily guessable combinations like “123456” or “password1.” Research highlights that 60% of adults rely on simple passwords, and a significant percentage never change their banking credentials. To enhance online security, the expert recommends creating long, unique passwords and using two-factor authentication. Despite awareness of cyber threats, personal responsibility in safeguarding accounts remains crucial, emphasizing the need …

Share
Read More
Cybersecurity and Information Warfare

Microsoft-Nyara Energy Incident: Key Lessons for India's Digital Sovereignty

The Microsoft-Nyara Energy incident has reignited debate over India’s digital sovereignty as recent developments reveal the ongoing impact of geopolitical risks on domestic critical infrastructure. On August 14 and 15, 2025, it emerged that Microsoft suspended its cloud services to Nyara Energy following EU sanctions on Russian-linked entities, raising new alarms about the reliance of Indian companies on foreign technology providers. The move, which temporarily disrupted Nyara’s business operations, highlighted concerns about state-influenced corporate decisions …

Share
Read More
Cybersecurity and Information Warfare

Operation Sindoor: Leveraging OSINT for Military Intelligence

Operation Sindoor, a pivotal 88-hour India-Pakistan conflict in May 2025, highlighted the importance of leveraging the OSINT community and defense-focused websites over traditional media for real-time intelligence. The operation showcased India’s indigenous military technology and successfully countered Pakistan’s misinformation campaigns. While traditional media often lacked detailed analysis and speed in reporting, OSINT platforms provided accurate, actionable insights that debunked adversarial narratives. This underscores the need for the Indian military to adopt a proactive approach in …

Share
Read More
Cybersecurity and Information Warfare

Ransomware Payouts Hit Record Highs Due to Data Theft and Social Engineering

The Q2 2025 ransomware report by Coveware reveals a significant rise in ransomware payouts, driven by targeted social engineering and sophisticated data exfiltration tactics. Average ransom payments soared to $1.13 million, with data theft becoming the primary extortion method in 74% of cases. Professional services, healthcare, and consumer sectors were most affected, particularly mid-sized organizations. The report underscores the need for enhanced employee awareness and robust security measures, as attackers increasingly exploit human vulnerabilities and …

Share
Read More
Cybersecurity and Information Warfare

Ex-Navy officer, 87, scammed of Rs. 14.5 lakh by cyber fraudster

An 87-year-old former Indian Navy lieutenant commander was scammed out of Rs. 14.5 lakh by a cyber fraudster posing as a Mumbai police officer, claiming he was involved in a money laundering case. The fraudster coerced the victim into transferring his savings by threatening arrest and presenting false evidence, including an arrest warrant. The elderly man only realized he was duped after failing to reach the scammer for a refund. This incident underscores the pervasive …

Share
Read More
Cybersecurity and Information Warfare

China studies Ukraine jamming to enhance electronic warfare tactics.

Chinese military researchers are examining electronic warfare tactics based on the jamming experiences observed in the Ukraine conflict, which began with Russia’s invasion in February 2022. Notably, both civilian and military satellite navigation systems, including China’s Beidou, were targeted, prompting a swift counter-jamming response from Western powers led by the United States. This incident is viewed as a significant example of electronic warfare between major military nations, providing valuable lessons for China in enhancing its …

Share
Read More
Cybersecurity and Information Warfare

India to legislate cybersecurity protections for power sector

The Indian government is advancing legislation to safeguard the power sector against cyber attacks, as announced by Minister of State for Power Shripad Naik. The Central Electricity Authority is finalizing the Cyber Security in Power Sector Regulations, ensuring that critical energy-related information remains within national boundaries. Additionally, IT equipment used in the sector will require clearances through the Trusted Telecom Portal starting January 1, 2026. Regular third-party cybersecurity audits for Operational Technology and Information Technology …

Share
Read More
Cybersecurity and Information Warfare

India's cyber doctrine aims high but faces implementation hurdles.

India’s Chief of Defence Staff, General Anil Chauhan, on August 7, 2025, officially released the declassified Joint Doctrine for Cyberspace Operations alongside the Joint Doctrine for Amphibious Operations, marking a decisive step to integrate offensive and defensive cyber capabilities across the Army, Navy, and Air Force. The doctrine lays out a unified framework emphasizing real-time intelligence sharing, threat-informed planning, resilience building, and synchronized tri-service cyber operations. It addresses challenges like attacker anonymity and rapidly evolving …

Share
Read More
Cybersecurity and Information Warfare

Cert-In shifts cybersecurity audits to focus on threat preparedness

The Indian Computer Emergency Response Team (Cert-In) has introduced new cybersecurity audit guidelines that shift focus from compliance to continuous threat preparedness. This framework mandates comprehensive coverage of an organization’s ICT structure, requiring top management to take ownership of cybersecurity programs. With a growing reliance on digital infrastructure, sectors like banking, telecom, and healthcare will face immediate impacts, emphasizing the need for robust security measures. The guidelines aim to enhance national cybersecurity readiness, aligning with …

Share
Read More
Enable Notifications OK No thanks