How AI-generated images darkened the picture for enterprises https://etimg.etb2bimg.com/thumb/msid-126298106,imgsize-38456,width-1200,height=627,overlay-etciso,resizemode-75/corporate/how-ai-generated-images-darkened-the-picture-for-enterprises.jpg With artificial intelligence-generated image tools getting more accessible, users are creating realistic and sometimes flawless recreations, sometimes to even make fake claims, experts said. This could spell real financial loss for companies, including in the ecommerce and quick commerce space, they said. Such an instance occurred in November, when a quick ...
Read More »Cyber Security News
My prediction for 2026: The shift to “Machine-Speed Defense”
My prediction for 2026: The shift to “Machine-Speed Defense” https://etimg.etb2bimg.com/thumb/msid-126304236,imgsize-357760,width-1200,height=627,overlay-etciso,resizemode-75/ciso-movement/2026-the-emergence-of-machine-speed-defense-in-cybersecurity.jpg For years, “Human-in-the-Loop” (HITL) has been the mantra of responsible AI. We envisioned a future where artificial intelligence would augment our capabilities, but a human would always retain the final say — the ultimate “kill switch.” In cybersecurity, this model has served us reasonably well, allowing human analysts to review, ...
Read More »European Space Agency confirms cyberattack on some its systems
European Space Agency confirms cyberattack on some its systems https://etimg.etb2bimg.com/thumb/msid-126298138,imgsize-105962,width-1200,height=627,overlay-etciso,resizemode-75/data-breaches/european-space-agency-confirms-cyberattack-on-some-its-systems.jpg The European Space Agency (ESA) has confirmed a cyberattack on some of its systems after a hacker offered to sell data allegedly stolen from the organisation. The agency’s forensic investigation has revealed that servers located outside the ESA corporate network have been compromised. According to ESA, only a very small ...
Read More »Cybersecurity outlook 2026: Smart devices, smarter threats
Cybersecurity outlook 2026: Smart devices, smarter threats https://etimg.etb2bimg.com/thumb/msid-126264008,imgsize-833784,width-1200,height=627,overlay-etciso,resizemode-75/cybercrime-fraud/cybersecurity-outlook-2026-smart-devices-smarter-threats.jpg Remember when the biggest security risk was your colleague writing their password on a sticky note. Those were simpler times. As we head into 2026, eScan (MicroWorld Technologies Inc.) has analyzed emerging threat patterns, and frankly, sticky notes are starting to look old-world and charming. The cybersecurity landscape in 2026 won’t just ...
Read More »Cyber fraud surge: SBI records nearly 16,000 cases in 22 months, Rs 118 crore lost
Cyber fraud surge: SBI records nearly 16,000 cases in 22 months, Rs 118 crore lost https://etimg.etb2bimg.com/thumb/msid-126185820,imgsize-797732,width-1200,height=627,overlay-etciso,resizemode-75/cybercrime-fraud/sbi-reports-alarming-surge-in-cyber-fraud-cases-16000-incidents-over-22-months-rs-118-crore-lost.jpg Nearly 16,000 cyber fraud cases were reported across State Bank of India (SBI) branches nationwide over a 22-month period, highlighting growing concerns about digital security in the banking sector. A reply by SBI to RTI activist Abhay Kolarkar’s query on cyber frauds revealed that ...
Read More »TCS upgrades BaNCS platform with AI to enhance banking, securities operations
TCS upgrades BaNCS platform with AI to enhance banking, securities operations https://etimg.etb2bimg.com/thumb/msid-126088741,imgsize-21662,width-1200,height=627,overlay-etciso,resizemode-75/next-gen-tech/tcs-upgrades-bancs-platform-with-ai-to-enhance-banking-securities-operations.jpg TCS upgrades BaNCS platform with AI to enhance banking, securities operations Tata Consultancy Services has announced a major artificial intelligence upgrade to its flagship financial services platform, TCS BaNCS, with the launch of TCS BaNCS AI Compass—a new AI core designed to accelerate innovation for banks and securities ...
Read More »Global cyber threat activity intensifies in 2025
Global cyber threat activity intensifies in 2025 https://etimg.etb2bimg.com/thumb/msid-126072048,imgsize-52188,width-1200,height=627,overlay-etciso,resizemode-75/cybercrime-fraud/cybersecurity-alarm-unprecedented-rise-in-global-cyber-threats-in-2025.jpg A global cybersecurity report released for 2025 documents a sharp increase in cyber threats worldwide. The analysis recorded a 50% year-over-year rise in ransomware incidents, data breaches reaching their second-highest level on record, and sustained activity in underground markets selling compromised corporate access. The findings indicate a convergence of multiple attack vectors ...
Read More »Securing robotic process automation in modern supply chains
Securing robotic process automation in modern supply chains https://etimg.etb2bimg.com/thumb/msid-126071146,imgsize-71610,width-1200,height=627,overlay-etciso,resizemode-75/vulnerabilities-exploits/the-crucial-need-for-cybersecurity-in-robotic-process-automation-within-supply-chains.jpg The implementation of Robotic Process Automation (RPA) systems in supply chain operations represents a breakthrough for logistics and procurement and inventory management functions. RPA automation of high-volume tasks enables organisations to achieve maximum efficiency through its ability to process data and manage orders and perform system integration tasks. It does, however, ...
Read More »Cybersecurity outlook: Major trends to watch in 2026
Cybersecurity outlook: Major trends to watch in 2026 https://etimg.etb2bimg.com/thumb/msid-126071827,imgsize-95786,width-1200,height=627,overlay-etciso,resizemode-75/cybercrime-fraud/cybersecurity-trends-to-watch-in-2026-the-future-of-ai-soc-and-security-culture.jpg Cybersecurity has long ceased to be just a priority for CISOs and a technological concept. Its definition today focuses on leadership at the boardroom and C-Suite levels, where Boards and CISOs collaborate to translate cyber threats into operational, financial, and reputational impacts on the organization. In 2026, cybersecurity will shift from ...
Read More »Secure, inclusive e-Governance: How Jharkhand is leveraging tech to transform healthcare
Secure, inclusive e-Governance: How Jharkhand is leveraging tech to transform healthcare https://etimg.etb2bimg.com/thumb/msid-126132880,imgsize-95438,width-1200,height=627,overlay-etciso,resizemode-75/cybercrime-fraud/secure-inclusive-e-governance-how-jharkhand-is-leveraging-tech-to-transform-healthcare.jpg Ajoy Kumar Singh At the “Empowering Secure e-Governance” forum held in Ranchi, Ajoy Kumar Singh, Development Commissioner cum Additional Chief Secretary, Department of Health, Medical Education & Family Welfare, Government of Jharkhand, delivered the keynote address on “Technology for Transforming Governance.” In conversation with Arpit Gupta, Ajoy Kumar ...
Read More »
Firewall Support Company in India All type of Firewalls Support Provider Company in India











