Explore Business Standard
Cyber security firm QuicHeal's enterprise arm Seqrite has detected over 265 million attacks across 8 million endpoints or installed bases of its technology in India, the company said on Thursday. The report, "State of Malware In India" compiled by Seqrite Labs, found that Maharashtra, with 36.1 million threat detections, Gujarat (24.1 million), and Delhi (15.4 million) emerged as the most affected states, with Mumbai, New Delhi, and Kolkata identified as the top targeted cities. "We operate from close to 80 lakh plus endpoints. And these 80 lakh endpoints are deployed not only across the breadth of our nation, but also across 76 other countries. Between October 2024 and September 2025, Seqrite Labs monitored more than 80 lakh endpoints and recorded 265.52 million detections," a company official said. The official said that the data on attacks is based on endpoints deployed in India. "These 265 million attacks QuickHeal and Seqrite were able to block. We were able to prevent those .
Japan's space agency has suffered a series of cyberattacks since last year, but sensitive information related to rockets and satellites was not affected and it is continuing to investigate and take preventive measures, officials said Friday. Chief Cabinet Secretary Yoshimasa Hayashi acknowledged that the Japan Aerospace Exploration Agency, or JAXA, has had "a number of" cyberattacks since late last year. JAXA has investigated the extent of illegal access while shutting down the affected networks and verifying that they did not contain classified information about operations of rockets and satellites and national security, he said. Hayashi vowed to strengthen Japan's ability to counter cyberattacks. Japan has been accelerating a military buildup in response to China's growing military might and is hoping to be able to develop a counterstrike ability, but experts say Tokyo will continue to need to rely heavily on the United States for launching long-range cruise missiles at ...
Hackers linked to the Chinese government launched a state-sponsored operation that targeted New Zealand's Parliament in 2021, the country's security minister said on Tuesday. New Zealand's allegation comes a day after US and UK authorities announced a set of criminal charges and sanctions against seven hackers, all believed to be living in China, who targeted US officials, journalists, corporations, pro-democracy activists and the UK's election watchdog. "The use of cyber-enabled espionage operations to interfere with democratic institutions and processes anywhere is unacceptable," Minister Responsible for the Government Communications Security Bureau (GCSB) Judith Collins said in a media statement. Collins said the agency had also established links between a state-sponsored actor linked to China and malicious cyber activity targeting parliamentary entities in New Zealand. "The GCSB's National Cyber Security Centre (NCSC) completed a robust technical assessment following a compromi