Friday , May 9 2025

Tenable published new study
Why 42% of Indian organizations fall victim to breaches?

Tenable published a new study revealing that Indian organisations could not prevent 42% of cyberattacks on their businesses, only successfully thwarting 58% of cyberattacks over the past two years. Consequently, organisations have had to rely on reactive measures rather than preventing attacks from occurring in the first place.

The study further revealed that 78% of Indian respondents believe their organisations could better defend against cyberattacks with more resources dedicated to preventive cybersecurity. However, a concerning 64% indicated that their cybersecurity teams spend the majority of their time addressing critical incidents, hampering their capacity to take a proactive stance.

Microsoft Patches Four Critical Azure and Power Apps Vulns

Microsoft has fixed critical vulnerabilities in its core cloud services, including Azure Automation, Azure Storage, Azure DevOps, and Microsoft Power...
Read More
Microsoft Patches Four Critical Azure and Power Apps Vulns

Qilin Ransomware topped April 2025 with 45+ data leak disclosures

The cyber threat landscape is rapidly changing, with a notable increase in ransomware activity in April 2025, driven by the...
Read More
Qilin Ransomware topped April 2025 with 45+ data leak disclosures

SonicWall Patches 3 Flaws in SMA 100 Devices

SonicWall has released patches for three security flaws in SMA 100 Secure Mobile Access appliances that could allow remote code...
Read More
SonicWall Patches 3 Flaws in SMA 100 Devices

Top Ransomware Actively Attacking Financial Sector: 406 Incidents Disclosed

From April 2024 to April 2025, Flashpoint analysts noted that the financial sector was a major target for threat actors,...
Read More
Top Ransomware Actively Attacking Financial Sector: 406 Incidents Disclosed

Critical (CVSS 10) Flaw in Cisco IOS XE WLCs Allows RRA

Cisco has issued a security advisory for a critical vulnerability in its IOS XE Software for Wireless LAN Controllers (WLCs)....
Read More
Critical (CVSS 10) Flaw in Cisco IOS XE WLCs Allows RRA

CVE-2025-29824
Play Ransomware Exploited Windows CVE-2025-29824 as Zero-Day

Attackers linked to the Play ransomware operation deployed a zero-day privilege escalation exploit during an attempted attack against an organization...
Read More
CVE-2025-29824  Play Ransomware Exploited Windows CVE-2025-29824 as Zero-Day

Hacker exploited Samsung MagicINFO 9 Server RCE flaw

Hackers are exploiting an unauthenticated remote code execution vulnerability in the Samsung MagicINFO 9 Server to take control of devices...
Read More
Hacker exploited Samsung MagicINFO 9 Server RCE flaw

CISA adds Langflow flaw to its KEV catalog

CISA added the Langflow vulnerability, CVE-2025-3248 (CVSS score 9.8), to its Known Exploited Vulnerabilities catalog. Langflow is a popular tool...
Read More
CISA adds Langflow flaw to its KEV catalog

Google Fixes Android Flaw (CVE-2025-27363) Exploited by Attackers

Google has released its monthly Android security updates, addressing 46 vulnerabilities, including one that has been actively exploited. CVE-2025-27363 (CVSS...
Read More
Google Fixes Android Flaw (CVE-2025-27363) Exploited by Attackers

UAP hosted “UAP Cyber Siege 2025”, A national level cybersecurity competition

The Cyber Security Club, representing the Department of Computer Science and Engineering at the University of Asia Pacific (UAP), has...
Read More
UAP hosted “UAP Cyber Siege 2025”, A national level cybersecurity competition

ALSO READ:

WhatsApp Introduces new privacy feature protect IP while Calling

The data is drawn from, “Old Habits Die Hard: How People, Process and Technology Challenges Are Hurting Cybersecurity Teams in India,” a commissioned study of 825 IT and cybersecurity professionals including 69 Indian respondents conducted in 2023 by Forrester Consulting on behalf of Tenable.

The study, which emphasises the significance of adopting a proactive cybersecurity approach, found that a core reason for the prevalent reactivity in Indian organisations’ cybersecurity practices is the lack of alignment in goals between IT and security teams. Seven in 10 (71%) organisations say their IT teams are more concerned with uptime than patching and remediation. The disparity results in a lack of coordination between the two teams, a challenge acknowledged by 43% of Indian organisations.

“In today’s threat landscape, by the time organisations react to cyberattacks, the battle is half lost,” said Kartik Shahani, Country Manager for Tenable India. “Organisations in India simply cannot afford to remain in reactive mode. The study we conducted sheds light on the inherent issues within Indian organisations’ own structure and operations. This misalignment in goals between IT and security teams results in a palpable lack of synchronisation, making it challenging for these vital components of an organisation to work cohesively toward a shared goal.”

This goal misalignment is further exacerbated as organisations race to adopt new and emerging software-as-a-service applications from third-party providers. Eight in 10 respondents (81%) of their organisations use a third-party program for SaaS apps and services. However, only over half (54%) have visibility into these third-party environments making proactive security measures elusive.

Shahani noted, “While there are no quick fixes to these challenges, implementing an exposure management program enables security professionals to better allocate time and resources so they can focus on taking the preventive actions that legitimately reduce an organisation’s cyber risk. It requires security teams to place as much importance on proactive efforts as they currently do on reactive incident response efforts. It requires security and IT professionals to consider how siloed organisational structures — and the myriad security tools used in support of those silos — are hindering their ability to see what an attacker sees. And it requires a way for security professionals to analyse the data coming from disparate tools to empower them to draw meaningful insights they can apply to their risk reduction goals.”

Check Also

Passwordless

Microsoft New Accounts Go Passwordless By Default

Microsoft is focusing on eliminating password-based authentication, promoting passwordless sign-in and sign-up methods instead. For …

Leave a Reply

Your email address will not be published. Required fields are marked *