{"id":31,"date":"2018-10-23T10:27:33","date_gmt":"2018-10-23T10:27:33","guid":{"rendered":"https:\/\/bolatme.com\/sleepdemo\/?page_id=31"},"modified":"2026-02-13T07:10:32","modified_gmt":"2026-02-13T07:10:32","slug":"cybersec-world","status":"publish","type":"page","link":"https:\/\/cybersecindiaexpo.com\/cybersec_world\/","title":{"rendered":"Knowledge Zone"},"content":{"rendered":"<div class=\"row\"  id=\"row-37204311\">\n\n\t<div id=\"col-895532678\" class=\"col small-12 large-12\"  >\n\t\t\t\t<div class=\"col-inner\"  >\n\t\t\t\n\t\t\t\n\n  \n    <div class=\"row KnowledgeZoneBlogs large-columns-3 medium-columns-1 small-columns-1\" >\n  <div class=\"col post-item\" >\n\t\t\t<div class=\"col-inner\">\n\t\t\t\t<div class=\"box box-default box-text-bottom box-blog-post has-hover\">\n            \t\t\t\t\t<div class=\"box-image\" >\n  \t\t\t\t\t\t<div class=\"image-cover\" style=\"padding-top:56.25%;\">\n\t\t\t\t\t\t\t<a href=\"https:\/\/cybersecindiaexpo.com\/cybersec_world\/news-list\/global-privacy-bodies-unite-to-curb-harmful-ai-imagery\/\" class=\"plain\" aria-label=\"Global Privacy Bodies Unite to Curb Harmful AI Imagery\">\n\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"180\" src=\"https:\/\/cybersecindiaexpo.com\/cybersec_world\/wp-content\/uploads\/2026\/02\/key-lock-password-security-privacy-protection-graphic-300x180.jpg\" class=\"attachment-medium size-medium wp-post-image\" alt=\"\" srcset=\"https:\/\/cybersecindiaexpo.com\/cybersec_world\/wp-content\/uploads\/2026\/02\/key-lock-password-security-privacy-protection-graphic-300x180.jpg 300w, https:\/\/cybersecindiaexpo.com\/cybersec_world\/wp-content\/uploads\/2026\/02\/key-lock-password-security-privacy-protection-graphic-1024x615.jpg 1024w, https:\/\/cybersecindiaexpo.com\/cybersec_world\/wp-content\/uploads\/2026\/02\/key-lock-password-security-privacy-protection-graphic-768x461.jpg 768w, https:\/\/cybersecindiaexpo.com\/cybersec_world\/wp-content\/uploads\/2026\/02\/key-lock-password-security-privacy-protection-graphic-1536x922.jpg 1536w, https:\/\/cybersecindiaexpo.com\/cybersec_world\/wp-content\/uploads\/2026\/02\/key-lock-password-security-privacy-protection-graphic-2048x1229.jpg 2048w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/>\t\t\t\t\t\t\t<\/a>\n  \t\t\t\t\t\t\t  \t\t\t\t\t\t\t  \t\t\t\t\t\t<\/div>\n  \t\t\t\t\t\t  \t\t\t\t\t<\/div>\n          \t\t\t\t\t<div class=\"box-text text-center\" >\n\t\t\t\t\t<div class=\"box-text-inner blog-post-inner\">\n\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t<h5 class=\"post-title is-large \">\n\t\t\t\t\t\t<a href=\"https:\/\/cybersecindiaexpo.com\/cybersec_world\/news-list\/global-privacy-bodies-unite-to-curb-harmful-ai-imagery\/\" class=\"plain\">Global Privacy Bodies Unite to Curb Harmful AI Imagery<\/a>\n\t\t\t\t\t<\/h5>\n\t\t\t\t\t\t\t\t\t\t<div class=\"is-divider\"><\/div>\n\t\t\t\t\t\t\t\t\t\t<p class=\"from_the_blog_excerpt \">\n\t\t\t\t\t\tGlobal regulators warn that AI-generated images and videos of real people without consent pose serious[...]\t\t\t\t\t<\/p>\n\t\t\t\t\t                    \n\t\t\t\t\t\n\t\t\t\t\t\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"badge absolute top post-date badge-outline\">\n\t\t\t\t\t\t\t<div class=\"badge-inner\">\n\t\t\t\t\t\t\t\t<span class=\"post-date-day\">25<\/span><br>\n\t\t\t\t\t\t\t\t<span class=\"post-date-month is-xsmall\">Feb<\/span>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div><div class=\"col post-item\" >\n\t\t\t<div class=\"col-inner\">\n\t\t\t\t<div class=\"box box-default box-text-bottom box-blog-post has-hover\">\n            \t\t\t\t\t<div class=\"box-image\" >\n  \t\t\t\t\t\t<div class=\"image-cover\" style=\"padding-top:56.25%;\">\n\t\t\t\t\t\t\t<a href=\"https:\/\/cybersecindiaexpo.com\/cybersec_world\/news-list\/anthropic-unveils-ai-tool-to-detect-and-fix-code-vulnerabilities\/\" class=\"plain\" aria-label=\"Anthropic Unveils AI Tool to Detect and Fix Code Vulnerabilities\">\n\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"300\" src=\"https:\/\/cybersecindiaexpo.com\/cybersec_world\/wp-content\/uploads\/2026\/02\/cybersecurity-expert-writing-encrypted-code-300x300.jpg\" class=\"attachment-medium size-medium wp-post-image\" alt=\"\" srcset=\"https:\/\/cybersecindiaexpo.com\/cybersec_world\/wp-content\/uploads\/2026\/02\/cybersecurity-expert-writing-encrypted-code-300x300.jpg 300w, https:\/\/cybersecindiaexpo.com\/cybersec_world\/wp-content\/uploads\/2026\/02\/cybersecurity-expert-writing-encrypted-code-1024x1024.jpg 1024w, https:\/\/cybersecindiaexpo.com\/cybersec_world\/wp-content\/uploads\/2026\/02\/cybersecurity-expert-writing-encrypted-code-150x150.jpg 150w, https:\/\/cybersecindiaexpo.com\/cybersec_world\/wp-content\/uploads\/2026\/02\/cybersecurity-expert-writing-encrypted-code-768x768.jpg 768w, https:\/\/cybersecindiaexpo.com\/cybersec_world\/wp-content\/uploads\/2026\/02\/cybersecurity-expert-writing-encrypted-code-1536x1536.jpg 1536w, https:\/\/cybersecindiaexpo.com\/cybersec_world\/wp-content\/uploads\/2026\/02\/cybersecurity-expert-writing-encrypted-code-2048x2048.jpg 2048w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/>\t\t\t\t\t\t\t<\/a>\n  \t\t\t\t\t\t\t  \t\t\t\t\t\t\t  \t\t\t\t\t\t<\/div>\n  \t\t\t\t\t\t  \t\t\t\t\t<\/div>\n          \t\t\t\t\t<div class=\"box-text text-center\" >\n\t\t\t\t\t<div class=\"box-text-inner blog-post-inner\">\n\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t<h5 class=\"post-title is-large \">\n\t\t\t\t\t\t<a href=\"https:\/\/cybersecindiaexpo.com\/cybersec_world\/news-list\/anthropic-unveils-ai-tool-to-detect-and-fix-code-vulnerabilities\/\" class=\"plain\">Anthropic Unveils AI Tool to Detect and Fix Code Vulnerabilities<\/a>\n\t\t\t\t\t<\/h5>\n\t\t\t\t\t\t\t\t\t\t<div class=\"is-divider\"><\/div>\n\t\t\t\t\t\t\t\t\t\t<p class=\"from_the_blog_excerpt \">\n\t\t\t\t\t\tAI company Anthropic introduced an automated tool created to find software flaws and suggest exact[...]\t\t\t\t\t<\/p>\n\t\t\t\t\t                    \n\t\t\t\t\t\n\t\t\t\t\t\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"badge absolute top post-date badge-outline\">\n\t\t\t\t\t\t\t<div class=\"badge-inner\">\n\t\t\t\t\t\t\t\t<span class=\"post-date-day\">25<\/span><br>\n\t\t\t\t\t\t\t\t<span class=\"post-date-month is-xsmall\">Feb<\/span>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div><div class=\"col post-item\" >\n\t\t\t<div class=\"col-inner\">\n\t\t\t\t<div class=\"box box-default box-text-bottom box-blog-post has-hover\">\n            \t\t\t\t\t<div class=\"box-image\" >\n  \t\t\t\t\t\t<div class=\"image-cover\" style=\"padding-top:56.25%;\">\n\t\t\t\t\t\t\t<a href=\"https:\/\/cybersecindiaexpo.com\/cybersec_world\/news-list\/india-plans-new-cyber-law-to-tackle-ai-powered-threats\/\" class=\"plain\" aria-label=\"India Plans New Cyber Law to Tackle AI-Powered Threats\">\n\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"210\" height=\"300\" src=\"https:\/\/cybersecindiaexpo.com\/cybersec_world\/wp-content\/uploads\/2026\/02\/cybersecurity-legal-protection-210x300.jpg\" class=\"attachment-medium size-medium wp-post-image\" alt=\"\" srcset=\"https:\/\/cybersecindiaexpo.com\/cybersec_world\/wp-content\/uploads\/2026\/02\/cybersecurity-legal-protection-210x300.jpg 210w, https:\/\/cybersecindiaexpo.com\/cybersec_world\/wp-content\/uploads\/2026\/02\/cybersecurity-legal-protection-717x1024.jpg 717w, https:\/\/cybersecindiaexpo.com\/cybersec_world\/wp-content\/uploads\/2026\/02\/cybersecurity-legal-protection-768x1097.jpg 768w, https:\/\/cybersecindiaexpo.com\/cybersec_world\/wp-content\/uploads\/2026\/02\/cybersecurity-legal-protection-1075x1536.jpg 1075w, https:\/\/cybersecindiaexpo.com\/cybersec_world\/wp-content\/uploads\/2026\/02\/cybersecurity-legal-protection-1434x2048.jpg 1434w, https:\/\/cybersecindiaexpo.com\/cybersec_world\/wp-content\/uploads\/2026\/02\/cybersecurity-legal-protection-scaled.jpg 1792w\" sizes=\"(max-width: 210px) 100vw, 210px\" \/>\t\t\t\t\t\t\t<\/a>\n  \t\t\t\t\t\t\t  \t\t\t\t\t\t\t  \t\t\t\t\t\t<\/div>\n  \t\t\t\t\t\t  \t\t\t\t\t<\/div>\n          \t\t\t\t\t<div class=\"box-text text-center\" >\n\t\t\t\t\t<div class=\"box-text-inner blog-post-inner\">\n\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t<h5 class=\"post-title is-large \">\n\t\t\t\t\t\t<a href=\"https:\/\/cybersecindiaexpo.com\/cybersec_world\/news-list\/india-plans-new-cyber-law-to-tackle-ai-powered-threats\/\" class=\"plain\">India Plans New Cyber Law to Tackle AI-Powered Threats<\/a>\n\t\t\t\t\t<\/h5>\n\t\t\t\t\t\t\t\t\t\t<div class=\"is-divider\"><\/div>\n\t\t\t\t\t\t\t\t\t\t<p class=\"from_the_blog_excerpt \">\n\t\t\t\t\t\tIndia is considering new cybersecurity law as AI reshapes threats, with leaders urging stronger defenses,[...]\t\t\t\t\t<\/p>\n\t\t\t\t\t                    \n\t\t\t\t\t\n\t\t\t\t\t\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"badge absolute top post-date badge-outline\">\n\t\t\t\t\t\t\t<div class=\"badge-inner\">\n\t\t\t\t\t\t\t\t<span class=\"post-date-day\">25<\/span><br>\n\t\t\t\t\t\t\t\t<span class=\"post-date-month is-xsmall\">Feb<\/span>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div><div class=\"col post-item\" >\n\t\t\t<div class=\"col-inner\">\n\t\t\t\t<div class=\"box box-default box-text-bottom box-blog-post has-hover\">\n            \t\t\t\t\t<div class=\"box-image\" >\n  \t\t\t\t\t\t<div class=\"image-cover\" style=\"padding-top:56.25%;\">\n\t\t\t\t\t\t\t<a href=\"https:\/\/cybersecindiaexpo.com\/cybersec_world\/news-list\/ai-ransomware-and-supply-chain-risks-redefine-cybersecurity-strategy-says-tata-steel-ciso\/\" class=\"plain\" aria-label=\"AI, Ransomware, and Supply Chain Risks Redefine Cybersecurity Strategy, says Tata Steel CISO\">\n\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"242\" src=\"https:\/\/cybersecindiaexpo.com\/cybersec_world\/wp-content\/uploads\/2026\/02\/Screenshot-2026-02-27-at-5.03.55\u202fPM-300x242.png\" class=\"attachment-medium size-medium wp-post-image\" alt=\"\" srcset=\"https:\/\/cybersecindiaexpo.com\/cybersec_world\/wp-content\/uploads\/2026\/02\/Screenshot-2026-02-27-at-5.03.55\u202fPM-300x242.png 300w, https:\/\/cybersecindiaexpo.com\/cybersec_world\/wp-content\/uploads\/2026\/02\/Screenshot-2026-02-27-at-5.03.55\u202fPM-768x619.png 768w, https:\/\/cybersecindiaexpo.com\/cybersec_world\/wp-content\/uploads\/2026\/02\/Screenshot-2026-02-27-at-5.03.55\u202fPM.png 926w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/>\t\t\t\t\t\t\t<\/a>\n  \t\t\t\t\t\t\t  \t\t\t\t\t\t\t  \t\t\t\t\t\t<\/div>\n  \t\t\t\t\t\t  \t\t\t\t\t<\/div>\n          \t\t\t\t\t<div class=\"box-text text-center\" >\n\t\t\t\t\t<div class=\"box-text-inner blog-post-inner\">\n\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t<h5 class=\"post-title is-large \">\n\t\t\t\t\t\t<a href=\"https:\/\/cybersecindiaexpo.com\/cybersec_world\/news-list\/ai-ransomware-and-supply-chain-risks-redefine-cybersecurity-strategy-says-tata-steel-ciso\/\" class=\"plain\">AI, Ransomware, and Supply Chain Risks Redefine Cybersecurity Strategy, says Tata Steel CISO<\/a>\n\t\t\t\t\t<\/h5>\n\t\t\t\t\t\t\t\t\t\t<div class=\"is-divider\"><\/div>\n\t\t\t\t\t\t\t\t\t\t<p class=\"from_the_blog_excerpt \">\n\t\t\t\t\t\tDinesh Kumar Shrimali, Chief Information Security Officer\u00a0(CISO) and Data Protection Officer (DPO) of\u00a0Tata Steel\u00a0Ltd., tells[...]\t\t\t\t\t<\/p>\n\t\t\t\t\t                    \n\t\t\t\t\t\n\t\t\t\t\t\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"badge absolute top post-date badge-outline\">\n\t\t\t\t\t\t\t<div class=\"badge-inner\">\n\t\t\t\t\t\t\t\t<span class=\"post-date-day\">25<\/span><br>\n\t\t\t\t\t\t\t\t<span class=\"post-date-month is-xsmall\">Feb<\/span>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div><div class=\"col post-item\" >\n\t\t\t<div class=\"col-inner\">\n\t\t\t\t<div class=\"box box-default box-text-bottom box-blog-post has-hover\">\n            \t\t\t\t\t<div class=\"box-image\" >\n  \t\t\t\t\t\t<div class=\"image-cover\" style=\"padding-top:56.25%;\">\n\t\t\t\t\t\t\t<a href=\"https:\/\/cybersecindiaexpo.com\/cybersec_world\/news-list\/paypal-loan-app-flaw-exposes-sensitive-customer-data\/\" class=\"plain\" aria-label=\"PayPal Loan App Flaw Exposes Sensitive Customer Data\">\n\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"198\" src=\"https:\/\/cybersecindiaexpo.com\/cybersec_world\/wp-content\/uploads\/2026\/02\/woman-hands-holding-smartphone-with-paypal-apps-screen-paypal-is-online-electronic-payment-system-300x198.jpg\" class=\"attachment-medium size-medium wp-post-image\" alt=\"\" srcset=\"https:\/\/cybersecindiaexpo.com\/cybersec_world\/wp-content\/uploads\/2026\/02\/woman-hands-holding-smartphone-with-paypal-apps-screen-paypal-is-online-electronic-payment-system-300x198.jpg 300w, https:\/\/cybersecindiaexpo.com\/cybersec_world\/wp-content\/uploads\/2026\/02\/woman-hands-holding-smartphone-with-paypal-apps-screen-paypal-is-online-electronic-payment-system-1024x674.jpg 1024w, https:\/\/cybersecindiaexpo.com\/cybersec_world\/wp-content\/uploads\/2026\/02\/woman-hands-holding-smartphone-with-paypal-apps-screen-paypal-is-online-electronic-payment-system-768x506.jpg 768w, https:\/\/cybersecindiaexpo.com\/cybersec_world\/wp-content\/uploads\/2026\/02\/woman-hands-holding-smartphone-with-paypal-apps-screen-paypal-is-online-electronic-payment-system-1536x1011.jpg 1536w, https:\/\/cybersecindiaexpo.com\/cybersec_world\/wp-content\/uploads\/2026\/02\/woman-hands-holding-smartphone-with-paypal-apps-screen-paypal-is-online-electronic-payment-system-2048x1349.jpg 2048w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/>\t\t\t\t\t\t\t<\/a>\n  \t\t\t\t\t\t\t  \t\t\t\t\t\t\t  \t\t\t\t\t\t<\/div>\n  \t\t\t\t\t\t  \t\t\t\t\t<\/div>\n          \t\t\t\t\t<div class=\"box-text text-center\" >\n\t\t\t\t\t<div class=\"box-text-inner blog-post-inner\">\n\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t<h5 class=\"post-title is-large \">\n\t\t\t\t\t\t<a href=\"https:\/\/cybersecindiaexpo.com\/cybersec_world\/news-list\/paypal-loan-app-flaw-exposes-sensitive-customer-data\/\" class=\"plain\">PayPal Loan App Flaw Exposes Sensitive Customer Data<\/a>\n\t\t\t\t\t<\/h5>\n\t\t\t\t\t\t\t\t\t\t<div class=\"is-divider\"><\/div>\n\t\t\t\t\t\t\t\t\t\t<p class=\"from_the_blog_excerpt \">\n\t\t\t\t\t\tPayPal disclosed a loan app flaw that exposed sensitive customer data, including Social Security numbers,[...]\t\t\t\t\t<\/p>\n\t\t\t\t\t                    \n\t\t\t\t\t\n\t\t\t\t\t\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"badge absolute top post-date badge-outline\">\n\t\t\t\t\t\t\t<div class=\"badge-inner\">\n\t\t\t\t\t\t\t\t<span class=\"post-date-day\">25<\/span><br>\n\t\t\t\t\t\t\t\t<span class=\"post-date-month is-xsmall\">Feb<\/span>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div><div class=\"col post-item\" >\n\t\t\t<div class=\"col-inner\">\n\t\t\t\t<div class=\"box box-default box-text-bottom box-blog-post has-hover\">\n            \t\t\t\t\t<div class=\"box-image\" >\n  \t\t\t\t\t\t<div class=\"image-cover\" style=\"padding-top:56.25%;\">\n\t\t\t\t\t\t\t<a href=\"https:\/\/cybersecindiaexpo.com\/cybersec_world\/news-list\/adidas-probes-potential-data-leak-after-lapsus-claims-third-party-breach\/\" class=\"plain\" aria-label=\"Adidas Probes Potential Data Leak After Lapsus$ Claims Third-Party Breach\">\n\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"210\" src=\"https:\/\/cybersecindiaexpo.com\/cybersec_world\/wp-content\/uploads\/2026\/02\/data-breach-unsecured-warning-sign-concept-300x210.jpg\" class=\"attachment-medium size-medium wp-post-image\" alt=\"\" srcset=\"https:\/\/cybersecindiaexpo.com\/cybersec_world\/wp-content\/uploads\/2026\/02\/data-breach-unsecured-warning-sign-concept-300x210.jpg 300w, https:\/\/cybersecindiaexpo.com\/cybersec_world\/wp-content\/uploads\/2026\/02\/data-breach-unsecured-warning-sign-concept-1024x718.jpg 1024w, https:\/\/cybersecindiaexpo.com\/cybersec_world\/wp-content\/uploads\/2026\/02\/data-breach-unsecured-warning-sign-concept-768x539.jpg 768w, https:\/\/cybersecindiaexpo.com\/cybersec_world\/wp-content\/uploads\/2026\/02\/data-breach-unsecured-warning-sign-concept-1536x1078.jpg 1536w, https:\/\/cybersecindiaexpo.com\/cybersec_world\/wp-content\/uploads\/2026\/02\/data-breach-unsecured-warning-sign-concept-2048x1437.jpg 2048w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/>\t\t\t\t\t\t\t<\/a>\n  \t\t\t\t\t\t\t  \t\t\t\t\t\t\t  \t\t\t\t\t\t<\/div>\n  \t\t\t\t\t\t  \t\t\t\t\t<\/div>\n          \t\t\t\t\t<div class=\"box-text text-center\" >\n\t\t\t\t\t<div class=\"box-text-inner blog-post-inner\">\n\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t<h5 class=\"post-title is-large \">\n\t\t\t\t\t\t<a href=\"https:\/\/cybersecindiaexpo.com\/cybersec_world\/news-list\/adidas-probes-potential-data-leak-after-lapsus-claims-third-party-breach\/\" class=\"plain\">Adidas Probes Potential Data Leak After Lapsus$ Claims Third-Party Breach<\/a>\n\t\t\t\t\t<\/h5>\n\t\t\t\t\t\t\t\t\t\t<div class=\"is-divider\"><\/div>\n\t\t\t\t\t\t\t\t\t\t<p class=\"from_the_blog_excerpt \">\n\t\t\t\t\t\tAdidas is investigating a possible data exposure after the hacking group Lapsus$ claimed it obtained[...]\t\t\t\t\t<\/p>\n\t\t\t\t\t                    \n\t\t\t\t\t\n\t\t\t\t\t\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"badge absolute top post-date badge-outline\">\n\t\t\t\t\t\t\t<div class=\"badge-inner\">\n\t\t\t\t\t\t\t\t<span class=\"post-date-day\">25<\/span><br>\n\t\t\t\t\t\t\t\t<span class=\"post-date-month is-xsmall\">Feb<\/span>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div><div class=\"col post-item\" >\n\t\t\t<div class=\"col-inner\">\n\t\t\t\t<div class=\"box box-default box-text-bottom box-blog-post has-hover\">\n            \t\t\t\t\t<div class=\"box-image\" >\n  \t\t\t\t\t\t<div class=\"image-cover\" style=\"padding-top:56.25%;\">\n\t\t\t\t\t\t\t<a href=\"https:\/\/cybersecindiaexpo.com\/cybersec_world\/news-list\/al-based-attacks-hit-indias-manufacturing-sector-seqrite-report\/\" class=\"plain\" aria-label=\"Al-based Attacks Hit India&#8217;s Manufacturing Sector: Seqrite Report\">\n\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"187\" src=\"https:\/\/cybersecindiaexpo.com\/cybersec_world\/wp-content\/uploads\/2026\/02\/composite-image-hacker-holding-laptop-credir-card-300x187.jpg\" class=\"attachment-medium size-medium wp-post-image\" alt=\"\" srcset=\"https:\/\/cybersecindiaexpo.com\/cybersec_world\/wp-content\/uploads\/2026\/02\/composite-image-hacker-holding-laptop-credir-card-300x187.jpg 300w, https:\/\/cybersecindiaexpo.com\/cybersec_world\/wp-content\/uploads\/2026\/02\/composite-image-hacker-holding-laptop-credir-card-1024x637.jpg 1024w, https:\/\/cybersecindiaexpo.com\/cybersec_world\/wp-content\/uploads\/2026\/02\/composite-image-hacker-holding-laptop-credir-card-768x478.jpg 768w, https:\/\/cybersecindiaexpo.com\/cybersec_world\/wp-content\/uploads\/2026\/02\/composite-image-hacker-holding-laptop-credir-card-1536x956.jpg 1536w, https:\/\/cybersecindiaexpo.com\/cybersec_world\/wp-content\/uploads\/2026\/02\/composite-image-hacker-holding-laptop-credir-card-2048x1274.jpg 2048w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/>\t\t\t\t\t\t\t<\/a>\n  \t\t\t\t\t\t\t  \t\t\t\t\t\t\t  \t\t\t\t\t\t<\/div>\n  \t\t\t\t\t\t  \t\t\t\t\t<\/div>\n          \t\t\t\t\t<div class=\"box-text text-center\" >\n\t\t\t\t\t<div class=\"box-text-inner blog-post-inner\">\n\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t<h5 class=\"post-title is-large \">\n\t\t\t\t\t\t<a href=\"https:\/\/cybersecindiaexpo.com\/cybersec_world\/news-list\/al-based-attacks-hit-indias-manufacturing-sector-seqrite-report\/\" class=\"plain\">Al-based Attacks Hit India&#8217;s Manufacturing Sector: Seqrite Report<\/a>\n\t\t\t\t\t<\/h5>\n\t\t\t\t\t\t\t\t\t\t<div class=\"is-divider\"><\/div>\n\t\t\t\t\t\t\t\t\t\t<p class=\"from_the_blog_excerpt \">\n\t\t\t\t\t\tAl-powered cyberattacks are rising against Indian manufacturing units, finds a study by Segrite.\t\t\t\t\t<\/p>\n\t\t\t\t\t                    \n\t\t\t\t\t\n\t\t\t\t\t\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"badge absolute top post-date badge-outline\">\n\t\t\t\t\t\t\t<div class=\"badge-inner\">\n\t\t\t\t\t\t\t\t<span class=\"post-date-day\">25<\/span><br>\n\t\t\t\t\t\t\t\t<span class=\"post-date-month is-xsmall\">Feb<\/span>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div><div class=\"col post-item\" >\n\t\t\t<div class=\"col-inner\">\n\t\t\t\t<div class=\"box box-default box-text-bottom box-blog-post has-hover\">\n            \t\t\t\t\t<div class=\"box-image\" >\n  \t\t\t\t\t\t<div class=\"image-cover\" style=\"padding-top:56.25%;\">\n\t\t\t\t\t\t\t<a href=\"https:\/\/cybersecindiaexpo.com\/cybersec_world\/news-list\/mhas-unveils-prahaar-strategy-to-combat-modern-terror-ecosystems\/\" class=\"plain\" aria-label=\"MHA&#8217;s unveils &#8216;PRAHAAR&#8217; Strategy to Combat Modern Terror Ecosystems\">\n\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"128\" src=\"https:\/\/cybersecindiaexpo.com\/cybersec_world\/wp-content\/uploads\/2026\/02\/Screenshot-2026-02-25-at-11.20.21\u202fAM-300x128.png\" class=\"attachment-medium size-medium wp-post-image\" alt=\"\" srcset=\"https:\/\/cybersecindiaexpo.com\/cybersec_world\/wp-content\/uploads\/2026\/02\/Screenshot-2026-02-25-at-11.20.21\u202fAM-300x128.png 300w, https:\/\/cybersecindiaexpo.com\/cybersec_world\/wp-content\/uploads\/2026\/02\/Screenshot-2026-02-25-at-11.20.21\u202fAM-768x326.png 768w, https:\/\/cybersecindiaexpo.com\/cybersec_world\/wp-content\/uploads\/2026\/02\/Screenshot-2026-02-25-at-11.20.21\u202fAM.png 880w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/>\t\t\t\t\t\t\t<\/a>\n  \t\t\t\t\t\t\t  \t\t\t\t\t\t\t  \t\t\t\t\t\t<\/div>\n  \t\t\t\t\t\t  \t\t\t\t\t<\/div>\n          \t\t\t\t\t<div class=\"box-text text-center\" >\n\t\t\t\t\t<div class=\"box-text-inner blog-post-inner\">\n\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t<h5 class=\"post-title is-large \">\n\t\t\t\t\t\t<a href=\"https:\/\/cybersecindiaexpo.com\/cybersec_world\/news-list\/mhas-unveils-prahaar-strategy-to-combat-modern-terror-ecosystems\/\" class=\"plain\">MHA&#8217;s unveils &#8216;PRAHAAR&#8217; Strategy to Combat Modern Terror Ecosystems<\/a>\n\t\t\t\t\t<\/h5>\n\t\t\t\t\t\t\t\t\t\t<div class=\"is-divider\"><\/div>\n\t\t\t\t\t\t\t\t\t\t<p class=\"from_the_blog_excerpt \">\n\t\t\t\t\t\tThe Ministry of Home Affairs (MHA) on Monday released the country's first National Counter-Terrorism Policy[...]\t\t\t\t\t<\/p>\n\t\t\t\t\t                    \n\t\t\t\t\t\n\t\t\t\t\t\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"badge absolute top post-date badge-outline\">\n\t\t\t\t\t\t\t<div class=\"badge-inner\">\n\t\t\t\t\t\t\t\t<span class=\"post-date-day\">25<\/span><br>\n\t\t\t\t\t\t\t\t<span class=\"post-date-month is-xsmall\">Feb<\/span>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div><div class=\"col post-item\" >\n\t\t\t<div class=\"col-inner\">\n\t\t\t\t<div class=\"box box-default box-text-bottom box-blog-post has-hover\">\n            \t\t\t\t\t<div class=\"box-image\" >\n  \t\t\t\t\t\t<div class=\"image-cover\" style=\"padding-top:56.25%;\">\n\t\t\t\t\t\t\t<a href=\"https:\/\/cybersecindiaexpo.com\/cybersec_world\/news-list\/hackers-target-schools-and-then-turn-on-parents\/\" class=\"plain\" aria-label=\"Hackers Target Schools\u2014and Then Turn on Parents\">\n\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"200\" src=\"https:\/\/cybersecindiaexpo.com\/cybersec_world\/wp-content\/uploads\/2026\/02\/little-hacker-boy-with-laptop-1-300x200.jpg\" class=\"attachment-medium size-medium wp-post-image\" alt=\"\" srcset=\"https:\/\/cybersecindiaexpo.com\/cybersec_world\/wp-content\/uploads\/2026\/02\/little-hacker-boy-with-laptop-1-300x200.jpg 300w, https:\/\/cybersecindiaexpo.com\/cybersec_world\/wp-content\/uploads\/2026\/02\/little-hacker-boy-with-laptop-1-1024x683.jpg 1024w, https:\/\/cybersecindiaexpo.com\/cybersec_world\/wp-content\/uploads\/2026\/02\/little-hacker-boy-with-laptop-1-768x512.jpg 768w, https:\/\/cybersecindiaexpo.com\/cybersec_world\/wp-content\/uploads\/2026\/02\/little-hacker-boy-with-laptop-1-1536x1024.jpg 1536w, https:\/\/cybersecindiaexpo.com\/cybersec_world\/wp-content\/uploads\/2026\/02\/little-hacker-boy-with-laptop-1-2048x1365.jpg 2048w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/>\t\t\t\t\t\t\t<\/a>\n  \t\t\t\t\t\t\t  \t\t\t\t\t\t\t  \t\t\t\t\t\t<\/div>\n  \t\t\t\t\t\t  \t\t\t\t\t<\/div>\n          \t\t\t\t\t<div class=\"box-text text-center\" >\n\t\t\t\t\t<div class=\"box-text-inner blog-post-inner\">\n\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t<h5 class=\"post-title is-large \">\n\t\t\t\t\t\t<a href=\"https:\/\/cybersecindiaexpo.com\/cybersec_world\/news-list\/hackers-target-schools-and-then-turn-on-parents\/\" class=\"plain\">Hackers Target Schools\u2014and Then Turn on Parents<\/a>\n\t\t\t\t\t<\/h5>\n\t\t\t\t\t\t\t\t\t\t<div class=\"is-divider\"><\/div>\n\t\t\t\t\t\t\t\t\t\t<p class=\"from_the_blog_excerpt \">\n\t\t\t\t\t\tWhen a secondary school in Antwerp declined to pay a ransom, the cybercrimes didn&#8217;t stop.[...]\t\t\t\t\t<\/p>\n\t\t\t\t\t                    \n\t\t\t\t\t\n\t\t\t\t\t\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"badge absolute top post-date badge-outline\">\n\t\t\t\t\t\t\t<div class=\"badge-inner\">\n\t\t\t\t\t\t\t\t<span class=\"post-date-day\">18<\/span><br>\n\t\t\t\t\t\t\t\t<span class=\"post-date-month is-xsmall\">Feb<\/span>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div><div class=\"col post-item\" >\n\t\t\t<div class=\"col-inner\">\n\t\t\t\t<div class=\"box box-default box-text-bottom box-blog-post has-hover\">\n            \t\t\t\t\t<div class=\"box-image\" >\n  \t\t\t\t\t\t<div class=\"image-cover\" style=\"padding-top:56.25%;\">\n\t\t\t\t\t\t\t<a href=\"https:\/\/cybersecindiaexpo.com\/cybersec_world\/news-list\/ai-driven-threats-fragile-resilience-and-the-boardroom-mandate\/\" class=\"plain\" aria-label=\"AI-Driven Threats, Fragile Resilience, and the Boardroom Mandate\">\n\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"259\" height=\"300\" src=\"https:\/\/cybersecindiaexpo.com\/cybersec_world\/wp-content\/uploads\/2026\/02\/Nantha-Ram-Ramalingam-259x300.jpg\" class=\"attachment-medium size-medium wp-post-image\" alt=\"\" srcset=\"https:\/\/cybersecindiaexpo.com\/cybersec_world\/wp-content\/uploads\/2026\/02\/Nantha-Ram-Ramalingam-259x300.jpg 259w, https:\/\/cybersecindiaexpo.com\/cybersec_world\/wp-content\/uploads\/2026\/02\/Nantha-Ram-Ramalingam-883x1024.jpg 883w, https:\/\/cybersecindiaexpo.com\/cybersec_world\/wp-content\/uploads\/2026\/02\/Nantha-Ram-Ramalingam-768x890.jpg 768w, https:\/\/cybersecindiaexpo.com\/cybersec_world\/wp-content\/uploads\/2026\/02\/Nantha-Ram-Ramalingam-1325x1536.jpg 1325w, https:\/\/cybersecindiaexpo.com\/cybersec_world\/wp-content\/uploads\/2026\/02\/Nantha-Ram-Ramalingam-1766x2048.jpg 1766w\" sizes=\"(max-width: 259px) 100vw, 259px\" \/>\t\t\t\t\t\t\t<\/a>\n  \t\t\t\t\t\t\t  \t\t\t\t\t\t\t  \t\t\t\t\t\t<\/div>\n  \t\t\t\t\t\t  \t\t\t\t\t<\/div>\n          \t\t\t\t\t<div class=\"box-text text-center\" >\n\t\t\t\t\t<div class=\"box-text-inner blog-post-inner\">\n\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t<h5 class=\"post-title is-large \">\n\t\t\t\t\t\t<a href=\"https:\/\/cybersecindiaexpo.com\/cybersec_world\/news-list\/ai-driven-threats-fragile-resilience-and-the-boardroom-mandate\/\" class=\"plain\">AI-Driven Threats, Fragile Resilience, and the Boardroom Mandate<\/a>\n\t\t\t\t\t<\/h5>\n\t\t\t\t\t\t\t\t\t\t<div class=\"is-divider\"><\/div>\n\t\t\t\t\t\t\t\t\t\t<p class=\"from_the_blog_excerpt \">\n\t\t\t\t\t\tAs part of its thought leadership series, the CyberSec India Expo team speaks with Nantha[...]\t\t\t\t\t<\/p>\n\t\t\t\t\t                    \n\t\t\t\t\t\n\t\t\t\t\t\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"badge absolute top post-date badge-outline\">\n\t\t\t\t\t\t\t<div class=\"badge-inner\">\n\t\t\t\t\t\t\t\t<span class=\"post-date-day\">12<\/span><br>\n\t\t\t\t\t\t\t\t<span class=\"post-date-month is-xsmall\">Feb<\/span>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div><div class=\"col post-item\" >\n\t\t\t<div class=\"col-inner\">\n\t\t\t\t<div class=\"box box-default box-text-bottom box-blog-post has-hover\">\n            \t\t\t\t\t<div class=\"box-image\" >\n  \t\t\t\t\t\t<div class=\"image-cover\" style=\"padding-top:56.25%;\">\n\t\t\t\t\t\t\t<a href=\"https:\/\/cybersecindiaexpo.com\/cybersec_world\/news-list\/deutsche-bahn-introduces-passkey-logins\/\" class=\"plain\" aria-label=\"Deutsche Bahn Introduces Passkey Logins\">\n\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"200\" src=\"https:\/\/cybersecindiaexpo.com\/cybersec_world\/wp-content\/uploads\/2026\/02\/4-300x200.jpg\" class=\"attachment-medium size-medium wp-post-image\" alt=\"\" srcset=\"https:\/\/cybersecindiaexpo.com\/cybersec_world\/wp-content\/uploads\/2026\/02\/4-300x200.jpg 300w, https:\/\/cybersecindiaexpo.com\/cybersec_world\/wp-content\/uploads\/2026\/02\/4.jpg 600w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/>\t\t\t\t\t\t\t<\/a>\n  \t\t\t\t\t\t\t  \t\t\t\t\t\t\t  \t\t\t\t\t\t<\/div>\n  \t\t\t\t\t\t  \t\t\t\t\t<\/div>\n          \t\t\t\t\t<div class=\"box-text text-center\" >\n\t\t\t\t\t<div class=\"box-text-inner blog-post-inner\">\n\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t<h5 class=\"post-title is-large \">\n\t\t\t\t\t\t<a href=\"https:\/\/cybersecindiaexpo.com\/cybersec_world\/news-list\/deutsche-bahn-introduces-passkey-logins\/\" class=\"plain\">Deutsche Bahn Introduces Passkey Logins<\/a>\n\t\t\t\t\t<\/h5>\n\t\t\t\t\t\t\t\t\t\t<div class=\"is-divider\"><\/div>\n\t\t\t\t\t\t\t\t\t\t<p class=\"from_the_blog_excerpt \">\n\t\t\t\t\t\tAccording to heise online, Deutsche Bahn has rolled out passkey-based login across its app and[...]\t\t\t\t\t<\/p>\n\t\t\t\t\t                    \n\t\t\t\t\t\n\t\t\t\t\t\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"badge absolute top post-date badge-outline\">\n\t\t\t\t\t\t\t<div class=\"badge-inner\">\n\t\t\t\t\t\t\t\t<span class=\"post-date-day\">12<\/span><br>\n\t\t\t\t\t\t\t\t<span class=\"post-date-month is-xsmall\">Feb<\/span>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div><div class=\"col post-item\" >\n\t\t\t<div class=\"col-inner\">\n\t\t\t\t<div class=\"box box-default box-text-bottom box-blog-post has-hover\">\n            \t\t\t\t\t<div class=\"box-image\" >\n  \t\t\t\t\t\t<div class=\"image-cover\" style=\"padding-top:56.25%;\">\n\t\t\t\t\t\t\t<a href=\"https:\/\/cybersecindiaexpo.com\/cybersec_world\/news-list\/enisa-revamps-international-cyber-strategy-to-strengthen-eus-global-cybersecurity-posture\/\" class=\"plain\" aria-label=\"ENISA Revamps International Cyber Strategy to Strengthen EU\u2019s Global Cybersecurity Posture\">\n\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"200\" src=\"https:\/\/cybersecindiaexpo.com\/cybersec_world\/wp-content\/uploads\/2026\/02\/3-300x200.jpg\" class=\"attachment-medium size-medium wp-post-image\" alt=\"\" srcset=\"https:\/\/cybersecindiaexpo.com\/cybersec_world\/wp-content\/uploads\/2026\/02\/3-300x200.jpg 300w, https:\/\/cybersecindiaexpo.com\/cybersec_world\/wp-content\/uploads\/2026\/02\/3.jpg 600w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/>\t\t\t\t\t\t\t<\/a>\n  \t\t\t\t\t\t\t  \t\t\t\t\t\t\t  \t\t\t\t\t\t<\/div>\n  \t\t\t\t\t\t  \t\t\t\t\t<\/div>\n          \t\t\t\t\t<div class=\"box-text text-center\" >\n\t\t\t\t\t<div class=\"box-text-inner blog-post-inner\">\n\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t<h5 class=\"post-title is-large \">\n\t\t\t\t\t\t<a href=\"https:\/\/cybersecindiaexpo.com\/cybersec_world\/news-list\/enisa-revamps-international-cyber-strategy-to-strengthen-eus-global-cybersecurity-posture\/\" class=\"plain\">ENISA Revamps International Cyber Strategy to Strengthen EU\u2019s Global Cybersecurity Posture<\/a>\n\t\t\t\t\t<\/h5>\n\t\t\t\t\t\t\t\t\t\t<div class=\"is-divider\"><\/div>\n\t\t\t\t\t\t\t\t\t\t<p class=\"from_the_blog_excerpt \">\n\t\t\t\t\t\tThe European Union Agency for Cybersecurity, ENISA, has unveiled a revised International Strategy aimed at[...]\t\t\t\t\t<\/p>\n\t\t\t\t\t                    \n\t\t\t\t\t\n\t\t\t\t\t\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"badge absolute top post-date badge-outline\">\n\t\t\t\t\t\t\t<div class=\"badge-inner\">\n\t\t\t\t\t\t\t\t<span class=\"post-date-day\">12<\/span><br>\n\t\t\t\t\t\t\t\t<span class=\"post-date-month is-xsmall\">Feb<\/span>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div><div class=\"col post-item\" >\n\t\t\t<div class=\"col-inner\">\n\t\t\t\t<div class=\"box box-default box-text-bottom box-blog-post has-hover\">\n            \t\t\t\t\t<div class=\"box-image\" >\n  \t\t\t\t\t\t<div class=\"image-cover\" style=\"padding-top:56.25%;\">\n\t\t\t\t\t\t\t<a href=\"https:\/\/cybersecindiaexpo.com\/cybersec_world\/news-list\/discord-confirms-user-data-exposed-in-breach\/\" class=\"plain\" aria-label=\"Discord Confirms User Data Exposed in Breach\">\n\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"200\" src=\"https:\/\/cybersecindiaexpo.com\/cybersec_world\/wp-content\/uploads\/2026\/02\/2-300x200.jpg\" class=\"attachment-medium size-medium wp-post-image\" alt=\"\" srcset=\"https:\/\/cybersecindiaexpo.com\/cybersec_world\/wp-content\/uploads\/2026\/02\/2-300x200.jpg 300w, https:\/\/cybersecindiaexpo.com\/cybersec_world\/wp-content\/uploads\/2026\/02\/2.jpg 600w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/>\t\t\t\t\t\t\t<\/a>\n  \t\t\t\t\t\t\t  \t\t\t\t\t\t\t  \t\t\t\t\t\t<\/div>\n  \t\t\t\t\t\t  \t\t\t\t\t<\/div>\n          \t\t\t\t\t<div class=\"box-text text-center\" >\n\t\t\t\t\t<div class=\"box-text-inner blog-post-inner\">\n\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t<h5 class=\"post-title is-large \">\n\t\t\t\t\t\t<a href=\"https:\/\/cybersecindiaexpo.com\/cybersec_world\/news-list\/discord-confirms-user-data-exposed-in-breach\/\" class=\"plain\">Discord Confirms User Data Exposed in Breach<\/a>\n\t\t\t\t\t<\/h5>\n\t\t\t\t\t\t\t\t\t\t<div class=\"is-divider\"><\/div>\n\t\t\t\t\t\t\t\t\t\t<p class=\"from_the_blog_excerpt \">\n\t\t\t\t\t\tDiscord has confirmed that user data was stolen after hackers breached a third-party customer support[...]\t\t\t\t\t<\/p>\n\t\t\t\t\t                    \n\t\t\t\t\t\n\t\t\t\t\t\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"badge absolute top post-date badge-outline\">\n\t\t\t\t\t\t\t<div class=\"badge-inner\">\n\t\t\t\t\t\t\t\t<span class=\"post-date-day\">12<\/span><br>\n\t\t\t\t\t\t\t\t<span class=\"post-date-month is-xsmall\">Feb<\/span>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div><div class=\"col post-item\" >\n\t\t\t<div class=\"col-inner\">\n\t\t\t\t<div class=\"box box-default box-text-bottom box-blog-post has-hover\">\n            \t\t\t\t\t<div class=\"box-image\" >\n  \t\t\t\t\t\t<div class=\"image-cover\" style=\"padding-top:56.25%;\">\n\t\t\t\t\t\t\t<a href=\"https:\/\/cybersecindiaexpo.com\/cybersec_world\/news-list\/chinas-cyber-war-games-targeting-regional-infrastructure\/\" class=\"plain\" aria-label=\"China\u2019s Cyber War Games Targeting Regional Infrastructure\">\n\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"250\" src=\"https:\/\/cybersecindiaexpo.com\/cybersec_world\/wp-content\/uploads\/2026\/02\/Data_security_12-300x250.jpg\" class=\"attachment-medium size-medium wp-post-image\" alt=\"\" srcset=\"https:\/\/cybersecindiaexpo.com\/cybersec_world\/wp-content\/uploads\/2026\/02\/Data_security_12-300x250.jpg 300w, https:\/\/cybersecindiaexpo.com\/cybersec_world\/wp-content\/uploads\/2026\/02\/Data_security_12-1024x853.jpg 1024w, https:\/\/cybersecindiaexpo.com\/cybersec_world\/wp-content\/uploads\/2026\/02\/Data_security_12-768x640.jpg 768w, https:\/\/cybersecindiaexpo.com\/cybersec_world\/wp-content\/uploads\/2026\/02\/Data_security_12-1536x1280.jpg 1536w, https:\/\/cybersecindiaexpo.com\/cybersec_world\/wp-content\/uploads\/2026\/02\/Data_security_12-2048x1707.jpg 2048w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/>\t\t\t\t\t\t\t<\/a>\n  \t\t\t\t\t\t\t  \t\t\t\t\t\t\t  \t\t\t\t\t\t<\/div>\n  \t\t\t\t\t\t  \t\t\t\t\t<\/div>\n          \t\t\t\t\t<div class=\"box-text text-center\" >\n\t\t\t\t\t<div class=\"box-text-inner blog-post-inner\">\n\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t<h5 class=\"post-title is-large \">\n\t\t\t\t\t\t<a href=\"https:\/\/cybersecindiaexpo.com\/cybersec_world\/news-list\/chinas-cyber-war-games-targeting-regional-infrastructure\/\" class=\"plain\">China\u2019s Cyber War Games Targeting Regional Infrastructure<\/a>\n\t\t\t\t\t<\/h5>\n\t\t\t\t\t\t\t\t\t\t<div class=\"is-divider\"><\/div>\n\t\t\t\t\t\t\t\t\t\t<p class=\"from_the_blog_excerpt \">\n\t\t\t\t\t\tLeaked technical files show that China may be practicing cyberattacks on the critical infrastructure of[...]\t\t\t\t\t<\/p>\n\t\t\t\t\t                    \n\t\t\t\t\t\n\t\t\t\t\t\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"badge absolute top post-date badge-outline\">\n\t\t\t\t\t\t\t<div class=\"badge-inner\">\n\t\t\t\t\t\t\t\t<span class=\"post-date-day\">12<\/span><br>\n\t\t\t\t\t\t\t\t<span class=\"post-date-month is-xsmall\">Feb<\/span>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div><div class=\"col post-item\" >\n\t\t\t<div class=\"col-inner\">\n\t\t\t\t<div class=\"box box-default box-text-bottom box-blog-post has-hover\">\n            \t\t\t\t\t<div class=\"box-image\" >\n  \t\t\t\t\t\t<div class=\"image-cover\" style=\"padding-top:56.25%;\">\n\t\t\t\t\t\t\t<a href=\"https:\/\/cybersecindiaexpo.com\/cybersec_world\/news-list\/cybersecurity-emerges-as-india-incs-top-business-risk-ficci-ey-survey-2026\/\" class=\"plain\" aria-label=\"Cybersecurity Emerges as India Inc\u2019s Top Business Risk: FICCI\u2013EY Survey 2026\">\n\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"200\" src=\"https:\/\/cybersecindiaexpo.com\/cybersec_world\/wp-content\/uploads\/2026\/02\/1-300x200.jpg\" class=\"attachment-medium size-medium wp-post-image\" alt=\"\" srcset=\"https:\/\/cybersecindiaexpo.com\/cybersec_world\/wp-content\/uploads\/2026\/02\/1-300x200.jpg 300w, https:\/\/cybersecindiaexpo.com\/cybersec_world\/wp-content\/uploads\/2026\/02\/1.jpg 600w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/>\t\t\t\t\t\t\t<\/a>\n  \t\t\t\t\t\t\t  \t\t\t\t\t\t\t  \t\t\t\t\t\t<\/div>\n  \t\t\t\t\t\t  \t\t\t\t\t<\/div>\n          \t\t\t\t\t<div class=\"box-text text-center\" >\n\t\t\t\t\t<div class=\"box-text-inner blog-post-inner\">\n\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t<h5 class=\"post-title is-large \">\n\t\t\t\t\t\t<a href=\"https:\/\/cybersecindiaexpo.com\/cybersec_world\/news-list\/cybersecurity-emerges-as-india-incs-top-business-risk-ficci-ey-survey-2026\/\" class=\"plain\">Cybersecurity Emerges as India Inc\u2019s Top Business Risk: FICCI\u2013EY Survey 2026<\/a>\n\t\t\t\t\t<\/h5>\n\t\t\t\t\t\t\t\t\t\t<div class=\"is-divider\"><\/div>\n\t\t\t\t\t\t\t\t\t\t<p class=\"from_the_blog_excerpt \">\n\t\t\t\t\t\tCybersecurity has emerged as the top risk for Indian businesses, with 51% of senior leaders[...]\t\t\t\t\t<\/p>\n\t\t\t\t\t                    \n\t\t\t\t\t\n\t\t\t\t\t\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"badge absolute top post-date badge-outline\">\n\t\t\t\t\t\t\t<div class=\"badge-inner\">\n\t\t\t\t\t\t\t\t<span class=\"post-date-day\">12<\/span><br>\n\t\t\t\t\t\t\t\t<span class=\"post-date-month is-xsmall\">Feb<\/span>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div><div class=\"col post-item\" >\n\t\t\t<div class=\"col-inner\">\n\t\t\t\t<div class=\"box box-default box-text-bottom box-blog-post has-hover\">\n            \t\t\t\t\t<div class=\"box-image\" >\n  \t\t\t\t\t\t<div class=\"image-cover\" style=\"padding-top:56.25%;\">\n\t\t\t\t\t\t\t<a href=\"https:\/\/cybersecindiaexpo.com\/cybersec_world\/news-list\/cybercrime-a-national-security-threat-says-hm-amit-shah\/\" class=\"plain\" aria-label=\"Cybercrime a National Security Threat, Says HM Amit Shah\">\n\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"195\" src=\"https:\/\/cybersecindiaexpo.com\/cybersec_world\/wp-content\/uploads\/2026\/02\/HM-AMIT-SHAH-STORY-300x195.jpg\" class=\"attachment-medium size-medium wp-post-image\" alt=\"\" srcset=\"https:\/\/cybersecindiaexpo.com\/cybersec_world\/wp-content\/uploads\/2026\/02\/HM-AMIT-SHAH-STORY-300x195.jpg 300w, https:\/\/cybersecindiaexpo.com\/cybersec_world\/wp-content\/uploads\/2026\/02\/HM-AMIT-SHAH-STORY.jpg 624w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/>\t\t\t\t\t\t\t<\/a>\n  \t\t\t\t\t\t\t  \t\t\t\t\t\t\t  \t\t\t\t\t\t<\/div>\n  \t\t\t\t\t\t  \t\t\t\t\t<\/div>\n          \t\t\t\t\t<div class=\"box-text text-center\" >\n\t\t\t\t\t<div class=\"box-text-inner blog-post-inner\">\n\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t<h5 class=\"post-title is-large \">\n\t\t\t\t\t\t<a href=\"https:\/\/cybersecindiaexpo.com\/cybersec_world\/news-list\/cybercrime-a-national-security-threat-says-hm-amit-shah\/\" class=\"plain\">Cybercrime a National Security Threat, Says HM Amit Shah<\/a>\n\t\t\t\t\t<\/h5>\n\t\t\t\t\t\t\t\t\t\t<div class=\"is-divider\"><\/div>\n\t\t\t\t\t\t\t\t\t\t<p class=\"from_the_blog_excerpt \">\n\t\t\t\t\t\tSource ~ PIB Union Home Minister Amit Shah has warned of cybercrime as a new[...]\t\t\t\t\t<\/p>\n\t\t\t\t\t                    \n\t\t\t\t\t\n\t\t\t\t\t\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"badge absolute top post-date badge-outline\">\n\t\t\t\t\t\t\t<div class=\"badge-inner\">\n\t\t\t\t\t\t\t\t<span class=\"post-date-day\">12<\/span><br>\n\t\t\t\t\t\t\t\t<span class=\"post-date-month is-xsmall\">Feb<\/span>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div><div class=\"col post-item\" >\n\t\t\t<div class=\"col-inner\">\n\t\t\t\t<div class=\"box box-default box-text-bottom box-blog-post has-hover\">\n            \t\t\t\t\t<div class=\"box-image\" >\n  \t\t\t\t\t\t<div class=\"image-cover\" style=\"padding-top:56.25%;\">\n\t\t\t\t\t\t\t<a href=\"https:\/\/cybersecindiaexpo.com\/cybersec_world\/news-list\/curbing-cyber-frauds-in-digital-india-how-the-government-is-strengthening-cybersecurity\/\" class=\"plain\" aria-label=\"Curbing Cyber Frauds in Digital India: How the Government is Strengthening Cybersecurity\">\n\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"169\" src=\"https:\/\/cybersecindiaexpo.com\/cybersec_world\/wp-content\/uploads\/2025\/11\/curbing-cyber-frauds-digital-india-cybersec-india-expo-poster-300x169.jpeg\" class=\"attachment-medium size-medium wp-post-image\" alt=\"Minimalist poster showing a teal map of India with an orange padlock symbolizing cybersecurity, designed in CyberSec India Expo brand colors to represent efforts in curbing cyber frauds in Digital India.\" srcset=\"https:\/\/cybersecindiaexpo.com\/cybersec_world\/wp-content\/uploads\/2025\/11\/curbing-cyber-frauds-digital-india-cybersec-india-expo-poster-300x169.jpeg 300w, https:\/\/cybersecindiaexpo.com\/cybersec_world\/wp-content\/uploads\/2025\/11\/curbing-cyber-frauds-digital-india-cybersec-india-expo-poster-1024x576.jpeg 1024w, https:\/\/cybersecindiaexpo.com\/cybersec_world\/wp-content\/uploads\/2025\/11\/curbing-cyber-frauds-digital-india-cybersec-india-expo-poster-768x432.jpeg 768w, https:\/\/cybersecindiaexpo.com\/cybersec_world\/wp-content\/uploads\/2025\/11\/curbing-cyber-frauds-digital-india-cybersec-india-expo-poster.jpeg 1220w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/>\t\t\t\t\t\t\t<\/a>\n  \t\t\t\t\t\t\t  \t\t\t\t\t\t\t  \t\t\t\t\t\t<\/div>\n  \t\t\t\t\t\t  \t\t\t\t\t<\/div>\n          \t\t\t\t\t<div class=\"box-text text-center\" >\n\t\t\t\t\t<div class=\"box-text-inner blog-post-inner\">\n\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t<h5 class=\"post-title is-large \">\n\t\t\t\t\t\t<a href=\"https:\/\/cybersecindiaexpo.com\/cybersec_world\/news-list\/curbing-cyber-frauds-in-digital-india-how-the-government-is-strengthening-cybersecurity\/\" class=\"plain\">Curbing Cyber Frauds in Digital India: How the Government is Strengthening Cybersecurity<\/a>\n\t\t\t\t\t<\/h5>\n\t\t\t\t\t\t\t\t\t\t<div class=\"is-divider\"><\/div>\n\t\t\t\t\t\t\t\t\t\t<p class=\"from_the_blog_excerpt \">\n\t\t\t\t\t\tBased on Government of India data and official press releases \u2014 Source: Press Information Bureau[...]\t\t\t\t\t<\/p>\n\t\t\t\t\t                    \n\t\t\t\t\t\n\t\t\t\t\t\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"badge absolute top post-date badge-outline\">\n\t\t\t\t\t\t\t<div class=\"badge-inner\">\n\t\t\t\t\t\t\t\t<span class=\"post-date-day\">03<\/span><br>\n\t\t\t\t\t\t\t\t<span class=\"post-date-month is-xsmall\">Nov<\/span>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div><div class=\"col post-item\" >\n\t\t\t<div class=\"col-inner\">\n\t\t\t\t<div class=\"box box-default box-text-bottom box-blog-post has-hover\">\n            \t\t\t\t\t<div class=\"box-image\" >\n  \t\t\t\t\t\t<div class=\"image-cover\" style=\"padding-top:56.25%;\">\n\t\t\t\t\t\t\t<a href=\"https:\/\/cybersecindiaexpo.com\/cybersec_world\/news-list\/in-the-age-of-digital-assets-security-must-be-proactive-decentralized-and-intelligent\/\" class=\"plain\" aria-label=\"In the Age of Digital Assets, Security Must Be Proactive, Decentralized, and Intelligent\">\n\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"169\" src=\"https:\/\/cybersecindiaexpo.com\/cybersec_world\/wp-content\/uploads\/2025\/11\/In-the-Age-of-Digital-Assets-Security-Must-Be-Proactive-Decentralized-and-Intelligent-300x169.png\" class=\"attachment-medium size-medium wp-post-image\" alt=\"\" srcset=\"https:\/\/cybersecindiaexpo.com\/cybersec_world\/wp-content\/uploads\/2025\/11\/In-the-Age-of-Digital-Assets-Security-Must-Be-Proactive-Decentralized-and-Intelligent-300x169.png 300w, https:\/\/cybersecindiaexpo.com\/cybersec_world\/wp-content\/uploads\/2025\/11\/In-the-Age-of-Digital-Assets-Security-Must-Be-Proactive-Decentralized-and-Intelligent-1024x576.png 1024w, https:\/\/cybersecindiaexpo.com\/cybersec_world\/wp-content\/uploads\/2025\/11\/In-the-Age-of-Digital-Assets-Security-Must-Be-Proactive-Decentralized-and-Intelligent-768x432.png 768w, https:\/\/cybersecindiaexpo.com\/cybersec_world\/wp-content\/uploads\/2025\/11\/In-the-Age-of-Digital-Assets-Security-Must-Be-Proactive-Decentralized-and-Intelligent.png 1220w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/>\t\t\t\t\t\t\t<\/a>\n  \t\t\t\t\t\t\t  \t\t\t\t\t\t\t  \t\t\t\t\t\t<\/div>\n  \t\t\t\t\t\t  \t\t\t\t\t<\/div>\n          \t\t\t\t\t<div class=\"box-text text-center\" >\n\t\t\t\t\t<div class=\"box-text-inner blog-post-inner\">\n\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t<h5 class=\"post-title is-large \">\n\t\t\t\t\t\t<a href=\"https:\/\/cybersecindiaexpo.com\/cybersec_world\/news-list\/in-the-age-of-digital-assets-security-must-be-proactive-decentralized-and-intelligent\/\" class=\"plain\">In the Age of Digital Assets, Security Must Be Proactive, Decentralized, and Intelligent<\/a>\n\t\t\t\t\t<\/h5>\n\t\t\t\t\t\t\t\t\t\t<div class=\"is-divider\"><\/div>\n\t\t\t\t\t\t\t\t\t\t<p class=\"from_the_blog_excerpt \">\n\t\t\t\t\t\tHow Fintel Defence is building India\u2019s next layer of cyber resilience As the digital economy[...]\t\t\t\t\t<\/p>\n\t\t\t\t\t                    \n\t\t\t\t\t\n\t\t\t\t\t\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"badge absolute top post-date badge-outline\">\n\t\t\t\t\t\t\t<div class=\"badge-inner\">\n\t\t\t\t\t\t\t\t<span class=\"post-date-day\">02<\/span><br>\n\t\t\t\t\t\t\t\t<span class=\"post-date-month is-xsmall\">Nov<\/span>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div><\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\n\t\n<\/div>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"page-news.php","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/cybersecindiaexpo.com\/cybersec_world\/wp-json\/wp\/v2\/pages\/31"}],"collection":[{"href":"https:\/\/cybersecindiaexpo.com\/cybersec_world\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/cybersecindiaexpo.com\/cybersec_world\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/cybersecindiaexpo.com\/cybersec_world\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/cybersecindiaexpo.com\/cybersec_world\/wp-json\/wp\/v2\/comments?post=31"}],"version-history":[{"count":19,"href":"https:\/\/cybersecindiaexpo.com\/cybersec_world\/wp-json\/wp\/v2\/pages\/31\/revisions"}],"predecessor-version":[{"id":2922,"href":"https:\/\/cybersecindiaexpo.com\/cybersec_world\/wp-json\/wp\/v2\/pages\/31\/revisions\/2922"}],"wp:attachment":[{"href":"https:\/\/cybersecindiaexpo.com\/cybersec_world\/wp-json\/wp\/v2\/media?parent=31"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}