Skip to content
Saturday, March 21, 2026
CISO Forum logo Final
  • facebook
  • instagram
  • twitter
  • youtube
  • Insights
  • View Points
  • Leadership Corner
  • Case Studies
  • News
  • Resources
    • Magazine
  • Contact
  • Events
    • The CISO Forum

Tag: Cyber Attacks

  • Home
  • Cyber Attacks
Seqrite Reveals Over 1.16 Million Cyber Attacks on India’s Financial Sector, Insurance Portals Emerge as Prime Targets
  • Press Release

Seqrite Reveals Over 1.16 Million Cyber Attacks on India’s Financial Sector, Insurance Portals Emerge as Prime Targets

  • CISO Forum Bureau
  • March 2, 2026
  • 0

Insurance companies are witnessing a rise in fake domain registrations and cloned customer portals designed to harvest policyholder data, according to the India Cyber Threat Report […]

Data Breaches in India’s Banking Sector in 2025: A Comprehensive Analysis
  • Latest
  • Opinion

Data Breaches in India’s Banking Sector in 2025: A Comprehensive Analysis

  • CISO Forum Bureau
  • December 30, 2025
  • 0

Executive Summary As India accelerates its digital transformation in banking and financial services, we face an unprecedented cybersecurity crisis that threatens not just individual institutions […]

Cybercriminals Step Up Attacks During the Holiday Online Shopping Rush
  • Press Release

Cybercriminals Step Up Attacks During the Holiday Online Shopping Rush

  • CISO Forum Bureau
  • December 23, 2025
  • 0

Every year, the holiday season brings a predictable spike in online activity. But in 2025, the volume of newly created malicious infrastructure, account compromise activity, […]

India Records265 million Cyber Attacks
  • Press Release

India Records265 million Cyber Attacks

  • CISO Forum Bureau
  • December 8, 2025
  • 0

Seqrite, the enterprise arm of Quick Heal Technologies Limited, a global cybersecurity solutions provider, has released the India Cyber Threat Report 2026 along with two […]

AI-Powered Cyber Weapons: How DDoS Attacks Have Become Geopolitical Precision Strikes
  • Interview

AI-Powered Cyber Weapons: How DDoS Attacks Have Become Geopolitical Precision Strikes

  • Jagrati Rakheja
  • September 12, 2025
  • 0

The cyber battlefield has undergone a dramatic transformation. With over 8 million DDoS attacks recorded in just the first half of 2025—including record-breaking 3.12 Tbps […]

Rapid Response Strategies for Cyber Attacks
  • Insights
  • Latest

Rapid Response Strategies for Cyber Attacks

  • CISO Forum
  • August 27, 2025
  • 0

Cyberattacks have evolved into sophisticated, coordinated threats targeting businesses,  governments, and critical infrastructure. Attackers leverage AI-powered malware, ransomware, and supply chain vulnerabilities to breach even the […]

Phishing gangs use split and nested QR codes to evade detection in a new wave of ‘Quishing’ attacks, uncovers Barracuda
  • Press Release

Phishing gangs use split and nested QR codes to evade detection in a new wave of ‘Quishing’ attacks, uncovers Barracuda

  • CISO Forum Bureau
  • August 25, 2025
  • 0

Barracuda threat analysts have uncovered two innovative techniques being used by cyber attackers to help malicious QR codes evade detection in phishing attacks. The techniques, […]

Veeam Launches Major Initiative to Train 100,000 Cyber Professionals as India Faces Security Crisis
  • Latest
  • News

Veeam Launches Major Initiative to Train 100,000 Cyber Professionals as India Faces Security Crisis

  • Jagrati Rakheja
  • August 22, 2025
  • 0

Government officials and industry leaders gathered in New Delhi to address India’s escalating cyber security challenges, with authorities warning of a massive skills shortage as […]

Coveware by Veeam Reveals Q2 2025 Ransomware Surge: Social Engineering and Data Exfiltration Drive Record Payouts
  • Press Release

Coveware by Veeam Reveals Q2 2025 Ransomware Surge: Social Engineering and Data Exfiltration Drive Record Payouts

  • CISO Forum Bureau
  • August 19, 2025
  • 0

Coveware by Veeam, the leading authority in ransomware response and cyber extortion trends, today unveiled its Q2 2025 ransomware report, spotlighting a dramatic escalation in […]

From Air-Gapped to Always-On: Securing Legacy OT Systems in Modern Manufacturing
  • Latest
  • Opinion

From Air-Gapped to Always-On: Securing Legacy OT Systems in Modern Manufacturing

  • CISO Forum Bureau
  • August 19, 2025
  • 0

Prior to the Industry 4.0 era, the Operational Technology (OT) ecosystem had limited cybersecurity risks as they were isolated from external networks and the internet.  […]

View Points

View All
  • View Points

Application Security from a Data Protection Compliance Perspective

  • CISO Forum
  • December 4, 2024
  • 0
  • View Points

How to secure your hybrid cloud environment?

  • CISO Forum
  • December 4, 2024
  • 0
  • View Points

Leveraging Security Operations Center (SOC) in your cyber security journey

  • CISO Forum
  • December 4, 2024
  • 0
Cybersecurity

India Cyber Threat Report 2026 Uncovers Credential Theft Attempts on Indian IT Sector; Seqrite Urges Zero-Trust Identity and DPDP Compliance for IT Resilience

  • CISO Forum Bureau
  • March 19, 2026
  • 0
DPDP

5 Leading Privacy Tools Recommended for Enterprise DPOs in the DPDP Era

  • CISO Forum Bureau
  • March 19, 2026
  • 0
Privacy Solutions

Top 5 Privacy Solutions Indian CISOs Are Prioritizing in 2026

  • CISO Forum Bureau
  • March 18, 2026
  • 0
Agentic AI

CrowdStrike and NVIDIA Just Changed How AI Agents Will Be Secured Forever

  • Jagrati Rakheja
  • March 18, 2026
  • 0
digital payments

Keep your digital payments out of trouble—here are some zippy tricks to dodge the online scam drama!

  • CISO Forum Bureau
  • March 18, 2026
  • 0
Cloud

Tamil Nadu Manufacturing Belt Sees a Steep Rise in Malware Infections in 2025, Reveals Seqrite

  • CISO Forum Bureau
  • March 17, 2026
  • 0

About CISO Forum

At CISO Forum, we are dedicated to fostering a vibrant community of cybersecurity leaders, innovators, and experts. Our mission is to empower these professionals with knowledge, resources, and connections to navigate the complex and ever-evolving landscape of cybersecurity.

Copyright © 2026