Skip to content
Tuesday, March 17, 2026
CISO Forum logo Final
  • facebook
  • instagram
  • twitter
  • youtube
  • Insights
  • View Points
  • Leadership Corner
  • Case Studies
  • News
  • Resources
    • Magazine
  • Contact
  • Events
    • The CISO Forum

Tag: Cyber Attacks

  • Home
  • Cyber Attacks
Seqrite Reveals Over 1.16 Million Cyber Attacks on India’s Financial Sector, Insurance Portals Emerge as Prime Targets
  • Press Release

Seqrite Reveals Over 1.16 Million Cyber Attacks on India’s Financial Sector, Insurance Portals Emerge as Prime Targets

  • CISO Forum Bureau
  • March 2, 2026
  • 0

Insurance companies are witnessing a rise in fake domain registrations and cloned customer portals designed to harvest policyholder data, according to the India Cyber Threat Report […]

Data Breaches in India’s Banking Sector in 2025: A Comprehensive Analysis
  • Latest
  • Opinion

Data Breaches in India’s Banking Sector in 2025: A Comprehensive Analysis

  • CISO Forum Bureau
  • December 30, 2025
  • 0

Executive Summary As India accelerates its digital transformation in banking and financial services, we face an unprecedented cybersecurity crisis that threatens not just individual institutions […]

Cybercriminals Step Up Attacks During the Holiday Online Shopping Rush
  • Press Release

Cybercriminals Step Up Attacks During the Holiday Online Shopping Rush

  • CISO Forum Bureau
  • December 23, 2025
  • 0

Every year, the holiday season brings a predictable spike in online activity. But in 2025, the volume of newly created malicious infrastructure, account compromise activity, […]

India Records265 million Cyber Attacks
  • Press Release

India Records265 million Cyber Attacks

  • CISO Forum Bureau
  • December 8, 2025
  • 0

Seqrite, the enterprise arm of Quick Heal Technologies Limited, a global cybersecurity solutions provider, has released the India Cyber Threat Report 2026 along with two […]

AI-Powered Cyber Weapons: How DDoS Attacks Have Become Geopolitical Precision Strikes
  • Interview

AI-Powered Cyber Weapons: How DDoS Attacks Have Become Geopolitical Precision Strikes

  • Jagrati Rakheja
  • September 12, 2025
  • 0

The cyber battlefield has undergone a dramatic transformation. With over 8 million DDoS attacks recorded in just the first half of 2025—including record-breaking 3.12 Tbps […]

Rapid Response Strategies for Cyber Attacks
  • Insights
  • Latest

Rapid Response Strategies for Cyber Attacks

  • CISO Forum
  • August 27, 2025
  • 0

Cyberattacks have evolved into sophisticated, coordinated threats targeting businesses,  governments, and critical infrastructure. Attackers leverage AI-powered malware, ransomware, and supply chain vulnerabilities to breach even the […]

Phishing gangs use split and nested QR codes to evade detection in a new wave of ‘Quishing’ attacks, uncovers Barracuda
  • Press Release

Phishing gangs use split and nested QR codes to evade detection in a new wave of ‘Quishing’ attacks, uncovers Barracuda

  • CISO Forum Bureau
  • August 25, 2025
  • 0

Barracuda threat analysts have uncovered two innovative techniques being used by cyber attackers to help malicious QR codes evade detection in phishing attacks. The techniques, […]

Veeam Launches Major Initiative to Train 100,000 Cyber Professionals as India Faces Security Crisis
  • Latest
  • News

Veeam Launches Major Initiative to Train 100,000 Cyber Professionals as India Faces Security Crisis

  • Jagrati Rakheja
  • August 22, 2025
  • 0

Government officials and industry leaders gathered in New Delhi to address India’s escalating cyber security challenges, with authorities warning of a massive skills shortage as […]

Coveware by Veeam Reveals Q2 2025 Ransomware Surge: Social Engineering and Data Exfiltration Drive Record Payouts
  • Press Release

Coveware by Veeam Reveals Q2 2025 Ransomware Surge: Social Engineering and Data Exfiltration Drive Record Payouts

  • CISO Forum Bureau
  • August 19, 2025
  • 0

Coveware by Veeam, the leading authority in ransomware response and cyber extortion trends, today unveiled its Q2 2025 ransomware report, spotlighting a dramatic escalation in […]

From Air-Gapped to Always-On: Securing Legacy OT Systems in Modern Manufacturing
  • Latest
  • Opinion

From Air-Gapped to Always-On: Securing Legacy OT Systems in Modern Manufacturing

  • CISO Forum Bureau
  • August 19, 2025
  • 0

Prior to the Industry 4.0 era, the Operational Technology (OT) ecosystem had limited cybersecurity risks as they were isolated from external networks and the internet.  […]

View Points

View All
  • View Points

Application Security from a Data Protection Compliance Perspective

  • CISO Forum
  • December 4, 2024
  • 0
  • View Points

How to secure your hybrid cloud environment?

  • CISO Forum
  • December 4, 2024
  • 0
  • View Points

Leveraging Security Operations Center (SOC) in your cyber security journey

  • CISO Forum
  • December 4, 2024
  • 0
Cloud

Tamil Nadu Manufacturing Belt Sees a Steep Rise in Malware Infections in 2025, Reveals Seqrite

  • CISO Forum Bureau
  • March 17, 2026
  • 0
AI Agent

Okta Just Flipped the Switch on AI Agent Security — and Enterprises Can’t Afford to Ignore It

  • Jagrati Rakheja
  • March 17, 2026
  • 0
Security

Your employees are your biggest security risk and 93% haven’t even finished their training

  • Jagrati Rakheja
  • March 16, 2026
  • 0
AI

Global Cyber Attacks Remain Near Record Highs in February 2026 Despite Ransomware Decline

  • CISO Forum Bureau
  • March 16, 2026
  • 0
Cybersecurity

Seqrite Reveals Key Insights into the Rising Software Supply Chain Attacks in 2026, Advises Enterprises to Secure their Digital Vendors

  • CISO Forum Bureau
  • March 12, 2026
  • 0
Zero Trust

Employees installing pirate software on work devices despite high risk of malware, Barracuda unveils

  • CISO Forum Bureau
  • March 12, 2026
  • 0

About CISO Forum

At CISO Forum, we are dedicated to fostering a vibrant community of cybersecurity leaders, innovators, and experts. Our mission is to empower these professionals with knowledge, resources, and connections to navigate the complex and ever-evolving landscape of cybersecurity.

Copyright © 2026