Category: aiXDR

Chandra Pandey on Why Unified Security and AI Are the Future of Cyber Resilience

Chandra Pandey on Why Unified Security and AI Are the Future of Cyber Resilience

In a recent interview with Tahawultech at GISEC Global 2025, Seceon Founder and CEO Chandra Shekhar Pandey shared his perspective on what cybersecurity needs most in this era of AI-driven threats: clarity, automation, and true platform unification. A Vision for Simplicity and Speed During the interview, Chandra outlined one of Seceon’s core beliefs: cybersecurity should

Read More
AI Is Supercharging Cybercrime — Here’s Why Threat Detection Needs to Evolve

AI Is Supercharging Cybercrime — Here’s Why Threat Detection Needs to Evolve

A new report published by Express Computer highlights a dramatic shift in the Indian cybersecurity landscape: AI is now powering a surge of faster, stealthier cyberattacks. Based on a survey by Fortinet and IDC of over 400 CISOs and CIOs across India, the findings reveal a pressing concern: organizations are facing a new generation of

Read More
Ransomware in the Supply Chain: What the DragonForce Attack Means for MSPs

Ransomware in the Supply Chain: What the DragonForce Attack Means for MSPs

In a recent report by BleepingComputer, DragonForce—a rapidly rising ransomware group—breached a managed service provider (MSP) and leveraged its SimpleHelp remote monitoring and management (RMM) platform to infiltrate downstream customers. Sophos, which investigated the attack, attributes the breach to a string of known SimpleHelp vulnerabilities (CVE-2024-57726 through CVE-2024-57728). Once inside, DragonForce actors conducted network reconnaissance,

Read More
ASUS Router Hijackings Highlight Urgent Need for Advanced Threat Detection and Response

ASUS Router Hijackings Highlight Urgent Need for Advanced Threat Detection and Response

Introduction: A Breach Beyond the EndpointA new campaign targeting ASUS routers has compromised more than 9,000 devices worldwide, exposing a hidden weakness in many organizations’ security strategies: insufficient visibility and control at the edge. The attack, dubbed ViciousTrap, exploits CVE-2023-39780—a command injection vulnerability—to deploy malware that persists even after reboots and firmware updates. (Cybersecurity Dive)

Read More

Categories

Seceon Inc
Privacy Overview

This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.