In the News
- India’s growth trajectory setting the stage for Budget 2026 January 13, 2026 9:03 am The Economic Times India’s economy is entering a phase of remarkable momentum ahead of Union Budget 2026. GDP expanded in the first quarter of FY2025–26 at the fastest pace in nearly two years, driven by resilient household consumption, a favourable monsoon that lifted rural …
- AI, geopolitics and fraud reshape global cyber risk landscape January 13, 2026 9:02 am Daily Times Published on: January 13, 2026 1:57 PM Artificial intelligence, geopolitical tensions, and a rise in cyber-enabled fraud are rapidly transforming the global cyber risk landscape, according to the World Economic Forum (WEF). The findings, published in the …
- India’s financial inclusion transforms lives of millions: DFS Secretary January 13, 2026 9:02 am The Tribune (Chandigarh) New Delhi [India], January 13 (ANI): India's ambitious financial inclusion drive has fundamentally transformed the economic landscape for hundreds of millions of citizens, particularly women and rural populations, a senior government official said at …
- Why trust not tech will decide the channel’s future January 13, 2026 8:53 am IT Pro Share Share this article Follow us Add us as a preferred source on Google Today, in every corner of the channel, a race is taking place. Businesses are scrambling to attach themselves to the latest technology breakthrough, the newest AI model, or the most …
- Cybersecurity And AI Risks Are Redefining Banking Supervision, Says RBI Deputy Governor January 13, 2026 8:41 am Outlook Money He concluded that while innovation should not be restricted, it should be built on trust, resilience, and customer fairness. In the digital age, banking supervision needs to become more vigilant, more aware of risks from an ecosystem-wide perspective, and …
- OWASP top 10 Challenges 2026 – Security Risks and Vulnerabilities January 13, 2026 8:40 am GBHackers OWASP is an online community that deals with different security challenges and OWASP stands for the “Open Web Application Security Project.” So, while managing a website, it’s essential to learn about the best critical security risks and vulnerabilities. …
- CISA Alerts on Actively Exploited Gogs Path Traversal Flaw January 13, 2026 8:40 am GBHackers The Cybersecurity and Infrastructure Security Agency (CISA) has added a critical vulnerability in Gogs, a self-hosted Git service, to its Known Exploited Vulnerabilities catalog, warning that the flaw is being actively exploited in the wild. Tracked as CVE …
- Building organization with results: How Muhammad Azeem Uddin redefines Tech Lead at Out2Sol Global January 13, 2026 8:31 am The Financial Daily International KARACHI: In an era where technology shapes economies and defines competitiveness, leadership has become the decisive factor between disruption and decline. At the forefront of this transformation stands Muhammad Azeem Uddin, Chief Operating Officer of …
- First Rehabilitation Resources Ensnared in Email Breach January 13, 2026 8:30 am Healthcare Facilities Today First Rehabilitation Resources has no evidence that any information has been misused by the malicious actor. In August 2025, First Rehabilitation Resources (FRR) became aware of suspicious activity on its email system. FRR promptly took action to contain …
- Boosting Regulation Adherence with Agentic AI: Expert Insights on How To Navigate CSCRF Mandates with AI-Assisted Compliance Automation January 13, 2026 8:30 am ETCIO.com Most CIOs grasp the intent behind regulations like the Cybersecurity and Cyber Resilience Framework (CSCRF), a SEBI-mandated framework to bolster cybersecurity in India’s booming digital finance sector. But when it comes to execution, a common issue …
- Top 3 Categories That Mostly Impact by Cyber Threats & Protection Against Cyber Attack January 13, 2026 8:25 am GBHackers Cybersecurity can be termed as the process of recovering programs, networks, and devices from different types of cyber threats. Over the past few years, cyber threats have evolved drastically and have put different enterprises and organizations into …
- Why Do We Need Antivirus Software for Android? Top 4 Best Anti-Virus & Their Impacts January 13, 2026 8:24 am GBHackers Best Antivirus Software provides high-level data protection for your Android device since it is the main targeted platform around the world. People often rely on android more than themselves these days. The quotidian usage of technology has made them more …
- Most Important Consideration To Prevent Insider Cyber Security Threats In Your Organization January 13, 2026 8:24 am GBHackers Insider threats are very real and make up the majority of cybersecurity attacks on enterprises. Yet, many businesses still spend most of their time safeguarding their systems against outsider threats. The worst with insider threats is that they often have …
- EU weighs Chinese tech squeeze January 13, 2026 8:24 am EurActiv TIMES A-CHANGIN’: Bruno Waterfield, the Times of London’s Brussels correspondent, will join Euractiv as political editor in March. He brings more than two decades of experience covering Brussels for the Times and The Telegraph, and will help shape our …
- Multiple Hikvision Vulnerabilities Let Attackers Cause Device Malfunction Using Crafted Packets January 13, 2026 8:23 am Cyber Security News Hikvision, a leading provider of surveillance and access control systems, faces serious security risks from two newly disclosed stack overflow vulnerabilities. These flaws, tracked as CVE-2025-66176 and CVE-2025-66177, allow attackers on the same local …
NOTE: Newsfeed limited to past 90 days and the following keywords: information security, cybersecurity, information technology risk, IT Risk, Security Risk and ISSA.