
Note: This blog is issued under public interest On July 25, 2025, the Indian Computer Emergency Response Team (CERT-In) released the CERT-In’s Comprehensive Cyber Security Audit Policy Guidelines (Version 1.0) — a structured and standardized audit framework that is mandatory
CIRCULAR SEBI/HO/ ITD-1/ITD_CSC_EXT/P/CIR/2025/96 June 30, 2025 To, All Alternative Investment Funds (AIFs) All Bankers to an Issue (BTI) and Self-Certified Syndicate Banks (SCSBs) All Clearing Corporations All Collective Investment Schemes (CIS) All Credit Rating Agencies (CRAs) All Custodians All
Bengaluru, India – June 19, 2025 – Cybersecurity researchers at Seconize, a leading provider of cyber risk and compliance automation solutions, have responsibly disclosed a significant security vulnerability in the Indian Railway Catering and Tourism Corporation (IRCTC) platform, which exposed
IRCTC Vulnerability: Introduction Note – A big shoutout to Rohan Kar, one of our security researchers at Seconize, for identifying a critical flaw in the IRCTC platform In June 2025, while booking a train ticket via the official IRCTC platform, I came
Like the proverbial pond teeming with fish and the lurking fisherman, our digital environments are rich with valuable data, and malicious actors are always on the hunt. Just as the ancient Panchatantra told the tale of three fish with vastly
Frequently Asked Questions (FAQs) on Cybersecurity and Cyber Resilience Framework (CSCRF) for SEBI REs and Framework for Adoption of Cloud Services by SEBI REs These FAQs aim to address the most common queries/ questions SEBI REs have about the CSCRF
Cyber risks have become a significant concern for organizations worldwide. These risks come in various forms and can originate from multiple sources. Broadly, cyber risks can be categorized into three main types: Technical Vulnerabilities, Process/Policy Gaps, and Third-Party Risks. Understanding
Cyber risks have become a significant concern for organizations worldwide. These risks come in various forms and can originate from multiple sources. Broadly, cyber risks can be categorized into three main types: Technical Vulnerabilities, Process/Policy Gaps, and Third-Party Risks. Understanding
Seconize DeRisk Centre – Part 2 Risk-Based Vulnerability Management sneak peek for Security Analysts (This blog is Part 2 of three-part series) As the world increasingly moves online, cyberattacks are becoming more and more common. That’s where security analysts come
In order to determine if the investments we make in cybersecurity are worthwhile, we need to consider several key factors, including risk management, ROI, and the potential impact of a cybersecurity incident on the organizational infrastructure and assets.
Recent Comments