CIRCULAR SEBI/HO/ ITD-1/ITD_CSC_EXT/P/CIR/2025/96 June 30, 2025 To, All Alternative Investment Funds (AIFs) All Bankers to an Issue (BTI) and Self-Certified Syndicate Banks (SCSBs) All Clearing Corporations All Collective Investment Schemes (CIS) All Credit Rating Agencies (CRAs) All Custodians All
Bengaluru, India – June 19, 2025 – Cybersecurity researchers at Seconize, a leading provider of cyber risk and compliance automation solutions, have responsibly disclosed a significant security vulnerability in the Indian Railway Catering and Tourism Corporation (IRCTC) platform, which exposed
IRCTC Vulnerability: Introduction Note – A big shoutout to Rohan Kar, one of our security researchers at Seconize, for identifying a critical flaw in the IRCTC platform In June 2025, while booking a train ticket via the official IRCTC platform, I came
Like the proverbial pond teeming with fish and the lurking fisherman, our digital environments are rich with valuable data, and malicious actors are always on the hunt. Just as the ancient Panchatantra told the tale of three fish with vastly
Frequently Asked Questions (FAQs) on Cybersecurity and Cyber Resilience Framework (CSCRF) for SEBI REs and Framework for Adoption of Cloud Services by SEBI REs These FAQs aim to address the most common queries/ questions SEBI REs have about the CSCRF
Cyber risks have become a significant concern for organizations worldwide. These risks come in various forms and can originate from multiple sources. Broadly, cyber risks can be categorized into three main types: Technical Vulnerabilities, Process/Policy Gaps, and Third-Party Risks. Understanding
Cyber risks have become a significant concern for organizations worldwide. These risks come in various forms and can originate from multiple sources. Broadly, cyber risks can be categorized into three main types: Technical Vulnerabilities, Process/Policy Gaps, and Third-Party Risks. Understanding
The “Underpants Gnomes,” a memorable creation from the South Park episode “Gnomes,” have a famously incomplete business plan: “Phase 1: Collect Underpants, Phase 2: ?, Phase 3: Profit!” The humor stems from the missing, yet crucial, middle step. This comical
There’s a parable often cited in behavioral science circles — simple, almost whimsical on the surface, but deeply revealing. The experiment may be apocryphal, but the metaphor is painfully real — especially in the world of cyber risk and compliance.
In the late 18th century, English philosopher and social theorist Jeremy Bentham proposed a radical architectural design for prisons known as the “Panopticon.” The concept was simple yet profound: a circular prison building with a central observation tower. The unique
In the world of cyber risk management, the Butterfly Effect serves as a powerful metaphor. A minor security flaw—just like the flap of a butterfly’s wings—can set off a cascade of events, leading to catastrophic breaches, vulnerabilities, financial losses, reputational
The term “super wicked problems“ was first introduced in a 2012 paper by Kelly Levin, Benjamin Cashore, Graeme Auld, and Steven Bernstein. It was developed to describe unique global challenges, particularly climate change, that are characterized by extreme complexity, urgency,
Recent Comments