8, Jul 2025
Samsung Introduces Future-Ready Mobile Security for Personalized AI Experiences

GURUGRAM, India – July 08, 2025:  Samsung Electronics today announced a new set of security and privacy updates rolling out with its upcoming Samsung Galaxy smartphones with One UI 8. These updates reinforce Samsung’s commitment to delivering powerful, trusted mobile technology in a rapidly evolving digital world by introducing new protections for on-device AI, expanding cross-device threat detection and enhancing network security with quantum-resistant encryption.

Next-Generation Mobile Security for AI Personalization

Samsung is introducing Knox Enhanced Encrypted Protection (KEEP), a new architecture designed to safeguard the next generation of personalized, AI-powered features, as its latest innovation in mobile security. KEEP creates encrypted, app-specific storage environments within the device’s secure storage area, ensuring that each app can access only its own sensitive information and nothing more.

Supporting Galaxy’s Personal Data Engine (PDE), KEEP helps secure a user’s deeply personal insights — such as routines and preferences — that enable features like Now Brief and Smart Gallery search. These insights stay entirely on-device, protected by KEEP and further secured by Knox Vault, Samsung’s tamper-resistant hardware security environment. The result is a seamless foundation for Galaxy AI that delivers personalized intelligence while keeping data tightly contained and under the user’s control.

KEEP’s system-level structure allows it to scale across Galaxy AI innovations. In addition to PDE, it now protects Now Brief, Smart Suggestions and other on-device features that rely on user-specific inputs — enabling more advanced AI experiences without compromising privacy. With KEEP, Samsung is redefining how mobile devices safeguard data in the background to elevate privacy from a setting to an embedded design principle.

Smarter, More Connected Threat Response With Knox Matrix

As AI becomes more integrated across the ecosystem, Samsung is advancing protections that offer not just stronger security, but greater transparency and control for users, with Knox Matrix leading the way. Through One UI 8, Samsung is evolving Knox Matrix to deliver more proactive and user-friendly protection for connected Galaxy devices. When a device is flagged for serious risk — such as system manipulation or identity forgery — it is designed to automatically sign out of the Samsung Account, cutting off access to cloud-connected services to prevent threats from spreading.

Users are notified across their connected Galaxy devices and guided to the ‘Security status of your devices’ page, where they can review the issue and take action. Even devices without the latest security status updates trigger a yellow-level warning, helping users respond before vulnerabilities grow.

Together, these updates make Samsung Galaxy’s ecosystem-level protection more dynamic, intuitive and visible, empowering users to maintain trust across all their devices with more confidence and clarity.

Secure Wi-Fi Strengthened With Quantum-Resistant Encryption

In continuation of its commitment to quantum-safe security, Samsung is bringing post-quantum cryptography to Secure Wi-Fi, extending the trusted approach first introduced on the Galaxy S25 series through Post-Quantum Enhanced Data Protection (EDP). Secure Wi-Fi is now being upgraded with a new cryptographic framework designed to strengthen network protection against emerging threats, particularly those anticipated in the era of quantum computing. This enhancement secures the key exchange process at the core of encrypted connections, helping ensure robust privacy even over public networks.

Quantum computing, once fully realized, could undermine many of today’s data protection methods. By integrating post-quantum cryptography, Secure Wi-Fi is built to withstand future attacks that capture encrypted data with the intent to break it once quantum technology matures — a tactic known as “harvest now, decrypt later.” This upgrade fortifies the secure tunnel between Galaxy devices and Samsung servers, reinforcing the integrity of data transmissions in high-risk environments like public Wi-Fi.

In addition to this future-ready foundation, Secure Wi-Fi offers a suite of advanced privacy features:

  • Auto Protect: Automatically activates in public places like cafés, airports or hotels, securing Wi-Fi connections without requiring user action.
  • Enhanced Privacy Protection (EPP): Encrypts internet traffic and routes it through multiple layers, combining packet encryption and relay to anonymize device information and help prevent tracking.
  • Protection Activity: Provides visibility into protection history by showing which apps and networks were secured and how much data was encrypted over time.

A Trusted Platform With Built-In Safeguards

In addition to its latest innovations, Samsung continues to strengthen the core protections that underpin the Galaxy experience. These features reflect a multi-layered security approach that protects across hardware and software, while giving users greater visibility and control:

  • Knox Vault secures sensitive credentials such as passwords, PINs and biometrics in a physically isolated environment, helping to keep them protected even if the main operating system is compromised.
  • Auto Blocker helps provide defense by default, blocking unauthorized app installs, restricting command-based attacks and mitigating risks from potential zero-click threats.
  • Advanced Intelligence Settings gives users the option to turn off online data processing for AI features, so personal information can stay on-device, fully under their control.
  • Enhanced Theft Protection helps protect personal data even in high-risk situations such as robbery, using safeguards like Identity Check and Security Delay to prevent unauthorized access.

This latest set of updates reinforces Samsung’s long-standing commitment to mobile security that evolves with innovation. It strengthens on-device privacy for personalized AI with KEEP, expands transparency and user control through Knox Matrix, and introduces quantum-resistant protection to Secure Wi-Fi for a more future-ready Galaxy experience. As new security challenges emerge, Samsung remains focused on delivering safeguards that are built in, always on and ready for what’s next.

5, Jul 2025
TECNO POVA 7 Series Sets a New Benchmark With Design Evolution and Power-Packed Features

India, July 5, 2025: In a market flooded with predictable upgrades and overpromised specs, TECNO takes a bold leap forward with the launch of its latest powerhouse duo — the POVA 7 Series on Flipkart. Known for delivering value-packed innovation focused on real user needs, TECNO brings POVA 7 and POVA 7 Pro to the mid-premium segment, combining serious performance, intuitive AI, and smart connectivity, all wrapped in a design built for India’s new-age learners, digital hustlers, and creators. Staying true to its #BetterFasterStronger promise, the series continues TECNO’s tradition of constant innovation under the POVA legacy.

tecno Pova

Commenting on the launch, Arijeet Talapatra, CEO of TECNO India said, “At TECNO, we believe ground-breaking technology shouldn’t be a privilege—it should be a tool for everyone. Especially for India’s young dreamers, doers and disruptors. That’s why POVA 7 is more than just a smartphone: it’s bold design, unstoppable connectivity, and AI that understands you—right down to your language. This device isn’t just built to impress—it’s built to empower.”

DESIGN: Inspired by Change, Built to Stand Out

Inspired by the delta symbol (Δ) — the universal sign for change, this series embraces evolution and progress. The triangular geometry isn’t just an aesthetic choice, it’s a tribute to users who are constantly evolving and pushing forward.

Visually striking, both smartphones feature TECNO’s segment-first Multi-Functional Delta Light Interface, a backlit design element with 104 Mini LED lights, that reacts to music, notifications, volume, and charging. It’s more than just visual flair; it’s a personality you can see, even from far away.
DISPLAY: Visual Brilliance for Every Experience

POVA 7 Pro features a 6.78-inch 1.5K AMOLED display with an ultra-smooth 144Hz refresh rate, delivering rich colors and seamless motion which is ideal for gaming, streaming, and content creation, making it the Best Display Experience in the segment. The POVA 7 offers the same screen size and refresh rate on a crisp FHD+ LTPS IPS display, ensuring immersive visuals for everyday use.

BATTERY & CHARGING: Power That Keeps Pace

Both smartphones pack a massive 6000mAh battery with 45W fast charging, designed for power users. The POVA 7 Pro raises the bar with 30W wireless charging, a first-in-segment feature, allowing users to cut the cord without sacrificing speed.

ACCESSIBLE AI & CONNECTIVITY: Everyday Intelligence, Everywhere

A standout across both smartphones is TECNO’s built-in AI assistant, Ella, now more intelligent and attuned to local needs with support for multiple Indian languages. From composing messages to translating content, Ella brings practical, everyday assistance to users across the country. Complementing this is the TECNO Intelligent Signal Hub, which strengthens connectivity with advanced features like 4×4 MIMO, VoWiFi Dual Pass, and a unique No Network Communication capability that allows device to device calling even without mobile signal, a game changer in areas with patchy or no coverage.

CAMERA: Creativity in Every Frame

Beyond stunning visuals, the POVA 7 Series delivers camera innovation designed for content-first lifestyles, with both smartphones supporting 4K video recording. The POVA 7 Pro is equipped with a 64MP Sony IMX682 main sensor and an 8MP secondary lens, featuring vlog modes and dual video functionality, perfect for creators who demand flexibility. Meanwhile, the POVA 7 offers a strong 50MP

AI camera, tuned for consistent results across lighting conditions and equipped with essential creative modes for everyday storytelling.

FIND YOUR FIT: Choose Your Style at an Amazing Price Point

While both phones share a strong core, the POVA 7 Pro brings additional premium features like an AMOLED display, wireless charging, and dual cameras for those who want more. The POVA 7 focuses on great everyday performance with a bold design and comes in three striking colors: Magic Silver, Oasis Green, and Geek Black.

For those seeking additional features, the POVA 7 Pro is available in three exquisite colors: Dynamic Grey, Neon Cyan, and Geek Black.

With technology this powerful in your hands, the POVA 7 Series is more than just a phone — it’s your next move, next idea, next win. Ready when you are. Sale starts 10th July on Flipkart.

4, Jul 2025
Infibeam’s Phronetic.AI, Nawgati Sign MoU for Real-Time Agentic AI & Video-LLM

Infibeam’s Phronetic.AI Signs MoU with Fuel-Tech Leader Nawgati Offering Agentic AI and Video-LLM Technology that Automates Reasoning Capabilities on Real-Time Basis

New Delhi, July 04, 2025Nueromind Technologies Private Limited (“Phronetic”), a cutting-edge deep-tech AI company owned by Infibeam Avenues Ltd, has entered into a Memorandum of Understanding (MoU) with Nawgati Tech Private Limited, a pioneering deep-tech company transforming India’s fuel and mobility infrastructure. This deal aims to co-develop next-generation AI-powered solutions tailored for the fueling, fleet, and energy sectors to automate reasoning capabilities for accurate decision making on real-time basis by using CCTV-video inputs.

Phronetic’s ABM platform is a multimodal technology that combines Video-Language Models (Video-LLMs) with a reasoning model. The Video-LLMs provide insight for understanding the environments, while the reasoning models provides intelligence in contextualizing this information. Ultimately, Phronetic’s Agentic AI, known as the field agent, enables real-time actions based on these insights.

Companies often face operational challenges related to improving efficiency and ensuring SOP (standard operating procedures) compliance. Although current technologies can identify or detect these challenges, they fall short in providing decision-making and action-oriented suggestions due to their lack of reasoning capabilities with video inputs.

“While reasoning capabilities using text are available in the market, there is a significant gap in reasoning models that effectively utilize video inputs, especially in industries such as manufacturing and retail, where physical production and on-the-floor activities take place. By leveraging reasoning capabilities to analyze video feeds, organizations can dramatically enhance their efficiency and SOP compliance, which will ultimately contribute to their business growth,” explained Mr. Rajesh Kumar, CEO of Phronetic AI, emphasizing that Phronetic’s technology addresses the pressing need for accurate decision-making by automating reasoning tasks and aiding to take an action.

Expressing his enthusiasm, Mr Rajesh Kumar further said “Partnering with Nawgati allows us to apply our intelligence at scale and create real-world impact in high-throughput, high-stakes energy operations.”

Mr. Vaibhav Kaushik, Co-Founder & CEO of Nawgati, said: “Nawgati is leading the digital transformation of India’s fuelling infrastructure through deep-tech solutions powered by AI and advanced deep learning algorithms. Our flagship platform, Aaveg, is deployed across thousands of fuel stations to monitor retail operations in real time, reduce pilferage, and ensure SOP compliance. We are delighted to work with Phronetic and leverage their advanced AI capabilities to enhance the intelligence and efficiency of our solutions. Together, we’re unlocking a new era of autonomy and efficiency across fuel and fleet networks.”

Key Highlights of the Collaboration:

Agentic AI Deployment: Phronetic will integrate its Field and Desk AI Agents into Nawgati’s tech stack to enhance operational intelligence, automate customer interactions, and support intelligent decision-making across various environments.

Go-to-Market (GTM) Partnership: Phronetic and Nawgati will jointly go to market with AI-powered offerings for the fuel, fleet, and energy sectors, leveraging Nawgati’s vast on-ground deployments, deep-tech Aaveg platform and Phronetic’s agentic AI capabilities.

Nawgati’s flagship product, Aaveg, is a vertical SaaS platform used by energy players to optimize forecourt operations, reduce inefficiencies, manage congestion, monitor SOPsand enhance compliance. Nawgati’s product is deployed across thousands of fuel outlets across the country. In addition, Nawgati powers India’s largest fueling app, serving over 2 million users, offering a seamless end-to-end fueling experience. Nawgati has also played a pivotal role in digitising CNG fleet programs across India, streamlining logistics and enhancing transparency for commercial vehicle networks. Fuel outlets of Indraprastha Gas, Mahanagar Gas, Torent Gas, and petrol pumps operated by dealers of Indian Oil, Bharat Petroleum, Hindustan Petroleum and JioBP use Nawgati’s products.

Founded at BITS Pilani, Nawgati is at the forefront of fuel-tech innovation, developing intelligent digital infrastructure solutions for India’s energy sector. By unifying fuel stations, fleet operators, and consumers on a single platform, Nawgati enhances network utilization, streamlines refueling operations, and offers real-time visibility into fuel availability and fleet movement. The company operates at the intersection of deep-tech, mobility, and energy, and is backed by marquee investors including GAIL (India) Ltd, Ajay Upadhyaya, Deepak Bhagnani Family Office, MeitY Startup Hub, Department of Science & Technology (DST), Jash Bhurjee, BITS Spark, and Aamara Capital.

Phronetic is an AI business vertical under Nueromind Technologies Private Limited, a pioneering deep-tech AI company and a subsidiary of Infibeam Avenues Ltd.

4, Jul 2025
Beyond Automation: Exposing the Security Gaps in Industrial Autonomy

In today’s fast-moving industrial IoT (IioT)  landscape, embedding AI-powered decision-making into operational technology system has fostered a sense of greater control, quicker response times, and improved predictive capabilities. However, this perception of control can, in reality, be a potentially dangerous illusion.

India’s industrial IoT market is experiencing rapid growth, reaching USD 9.40 billion in 2024 and projected to grow at a CAGR of 12.9% to USD 28.15 billion by 2033, driven by the increasing adoption of cloud computing, digital twins, robotics, and blockchain technology.

Autonomous systems are now responsible for critical infrastructure: smart grids, manufacturing lines and water treatment facilities, all relying on interconnected sensors and AI for autonomous decision-making. But as the layers of automation deepen, so too does the complexity, making it increasingly difficult to understand or audit decisions made by machines. The Indian government’s Digital India and Make in India initiatives are accelerating the adoption of AI and IIoT across sectors, encouraging organizations to integrate AI into their operations and fueling the country’s emergence as a global AI hub.

As more layers of automation are added, the number of interconnected components – think of sensors, AI algorithms, communication network, and control systems- grows exponentially. Each new layer introduces more variables, dependencies and potential points of failure. AI models themselves often operate as “black boxes,” making decisions based on patterns and data that are not always transparent. Plus, these systems constantly adapt and learn in real time, which adds unpredictability. All of this combined makes it harder to fully grasp, track, or audit how decisions are made inside the system, driving complexity ever higher.

The role of AI in OT environments

AI is transforming OT environments by enabling real-time analytics, predictive maintenance, dynamic response mechanisms and system-wide orchestration. Here are key examples of how AI is applied:

  • Predictive maintenance: In manufacturing, AI models forecast machinery failures based on metrics like vibration analysis and thermal imaging, reducing downtime.
  • Anomaly detection: In the energy sector, AI monitors voltage and frequency to detect abnormalities in grid performance before outages occur.
  • Autonomous control systems: In water treatment, AI algorithms dynamically adjust chemical dosages and valve operations based on sensor data.

India’s artificial intelligence market is projected to grow at a CAGR of 29.1% from 2025 to 2032, with AI adoption continuing to expand rapidly across manufacturing, healthcare, finance, and urban infrastructure including smart cities, traffic management, and public safety.

These implementations are part of Industry 4.0, where cyber-physical systems not only automate processes and boost efficiency but also blur the lines between IT and OT. Traditionally, OT systems were isolated, air-gapped and closed off from external networks for security. Now, with the rise of smart sensors, cloud computing and (smart edge) connected devices, those boundaries are blurring. IT and OT are becoming deeply intertwined, creating new opportunities, but also new risks, as the systems become more interconnected and dependent on each other. By 2026, cloud technology is expected to represent 8% of India’s GDP, potentially increasing the nation’s GDP by USD 310–380 billion and creating 14 million jobs. Cloud platforms are enabling Indian manufacturers to process real-time data from connected devices, optimize production, and reduce operational costs

Examples of automation per OT vertical

  • Energy: AI predicts load demand, optimizes energy dispatch and autonomously reroutes power in case of faults. Enel in Italy, uses AI and smart grids to balance energy supply and demand dynamically.
  • Manufacturing: Smart robots handle QA with computer vision, reorder inventory autonomously and self-correct production inefficiencies. Bosch uses smart robots equipped with computer vision for quality assurance on their production lines, spotting defects in real time.
  • Critical Infrastructure: AI regulates traffic lights based on congestion data and operates dam sluice gates to balance water levels. The Oosterschelde Keering is part of the Netherlands’ famous Delta Works, a massive system of dams, sluices, locks and barriers designed to protect the lower laying country from flooding by the North Sea. The barrier’s sluice gates can be autonomously operated to regulate water flow and maintain safe water levels, balancing the need to protect against storm surges while allowing tidal movements and shipping traffic. Sensors continuously monitor sea levels, weather conditions and structural integrity, feeding data into advanced control algorithms that decide when to close or open the gates.

The paradox of autonomy

The paradox of autonomy lies in the delicate balance between human control and machine independence. Autonomous systems are designed to operate without constant human intervention, aiming to enhance efficiency and responsiveness. However, this shift places human operators on the sidelines, reducing their direct oversight. Meanwhile, AI-driven systems continuously evolve, adapting their decision-making models in ways that can be unpredictable and difficult to fully understand. Compounding this challenge, many fail-safes remain hard-coded based on outdated assumptions that fail to reflect the dynamic nature of modern AI behavior. As a result, the very autonomy meant to increase safety and control can paradoxically introduce new risks and uncertainties, highlighting the urgent need for adaptive oversight mechanisms that keep pace with evolving technologies.

The dangers of threat autonomy

Autonomy introduces a new threat class: systems that can be manipulated, misled, or repurposed by adversaries. Attackers no longer need to break a system, they just need to confuse or poison its decision logic. Examples include:

  • AI confusion attacks: A sensor-fed AI in a power grid receives spoofed inputs, causing it to miscalculate loads and trip breakers unnecessarily.
  • Over-optimization exploits: In a smart factory, attackers subtly shift input values, prompting AI to unknowingly degrade product quality while chasing efficiency.
  • Cascading failures: Interconnected autonomous decisions in transport and energy grids can lead to systemic collapse if one node fails unpredictably.

For OT CISOs:

  • Demand explainability:  Demand explainability by ensuring your AI-driven systems use explainable AI (XAI) models. When an AI makes critical decisions, like shutting down a turbine, it is key to understand the reasoning behind those actions. Explainability builds trust, helps diagnose issues and supports compliance by making AI decisions transparent and accountable. Ensure your AI-driven systems include explainable AI (XAI) models. If a machine shuts down, you must know why!
  • Invest in red teams for AI models: In OT environments, red teams focused on AI models not only simulate cyber attacks, but also consider the physical impact on industrial processes and safety, especially as OT controls critical infrastructure, like power grids, manufacturing lines and water systems. These teams evaluate how AI-driven decisions could be manipulated to cause operational disruptions, equipment damage or even safety hazards. Invest in red teams for means testing both cyber and physical vulnerabilities to ensure robust, resilient and safe autonomous operations. These specialized teams simulate adversarial attacks or manipulation scenarios on AI systems.
  • Implement operational drift monitoring: Continuously monitor for model deviation from baseline behavior. Operational Drift Monitoring is the process of continuously tracking and analyzing changes in an operational system’s behavior or performance over time. In OT environments, it helps detect deviations from expected patterns, whether due to equipment wear, configuration changes or emerging security threats. By identifying these drifts early, organizations can prevent failures, reduce downtime and maintain system integrity and safety.
  • Embed human-in-the-loop (HITL) controls: Embed human-in-the-loop (HITL) controls to ensure that critical AI decisions, especially in high-stakes environments, are reviewed and verified by human operators. This approach combines the speed and efficiency of AI with human judgment and oversight, reducing the risk of errors or unintended consequences. HITL helps maintain safety, accountability and trust in automated systems where decisions can have significant real-world impacts.
2, Jul 2025
TeamViewer expands AI portfolio with TeamViewer Intelligence for IT support workflows

New Delhi,—July 2, 2025TeamViewer, a global leader in digital workplace solutions, introduces TeamViewer Intelligence, a growing suite of AI-powered features designed to enhance IT support with real-time automation, actionable insights, and in-session assistance.

With the recent launch of TeamViewer CoPilot, alongside existing capabilities like Session Insights and Analytics, TeamViewer Intelligence helps IT professionals reduce manual effort, resolve issues faster, and manage support operations more effectively, from service desks to distributed endpoints.

“With TeamViewer Intelligence, we’re embedding AI directly into support workflows, so teams don’t need to switch tools or break focus to get help,” said Mei Dent, Chief Product & Technology Officer at TeamViewer. “Whether it’s resolving a ticket or managing large-scale IT environments, we’re enabling faster decisions and more scalable operations through intelligent assistance.”

TeamViewer CoPilot is a contextual AI assistant embedded inside remote support sessions. IT agents can chat with it in real-time to access device data, diagnose issues, generate resolution workflows, or even automate everyday tasks, such as opening Task Manager or pulling system logs, without interrupting their workflow. For high-volume service desks, TeamViewer CoPilot transforms repetitive troubleshooting into rapid, scalable action.

Session Insights & Analytics gives IT leaders a comprehensive view of support operations, combining automated documentation with actionable data. Each support session is summarized automatically, including smart tags and step-by-step records of how issues were resolved—enabling faster handovers, easier reviews, and consistent knowledge sharing across teams. On top of that, built-in dashboards provide clear visibility into key metrics such as issue types, resolution times, session volume, and workload distribution—helping IT teams identify recurring problems, improve service quality, and optimize team performance over time.

All TeamViewer Intelligence features are available as add-ons to TeamViewer Corporate and Tensor licenses and are supported in the latest user interface.

TeamViewer’s application of AI extends beyond IT, supporting teams in the field as well. Assist AR features an AI-powered session summary that automatically transcribes and captures the key outcomes of remote video assistance calls. Designed for service technicians and deskless workers, this functionality helps teams document interactions quickly and stay compliant, without interrupting their workflow.

2, Jul 2025
OPSWAT and SentinelOne® Partner to Boost AI-Powered Malware Detection

INDIA, 2 July 2025OPSWAT, a global leader in critical infrastructure protection, and SentinelOne (NYSE:S) today announced their OEM partnership with the integration of SentinelOne’s industry-leading AI-powered detection capabilities into OPSWAT’s Metascan™ Multiscanning technology. This collaboration elevates malware detection across platforms, empowering enterprises to combat modern cyber threats with even greater precision and speed.

With SentinelOne’s AI/ML detection capabilities now part of OPSWAT’s Metascan Multiscanning, joint customers benefit from:

● Enhanced detection accuracy through industry-leading AI capabilities
● Cross-platform functionality, supporting both Windows and Linux deployments
● Stronger ransomware and zero-day threat defense with autonomous, cloud-independent operation

“OPSWAT’s mission is to ensure the secure and compliant flow of data across the world’s critical infrastructure,” said Tom Mullen, Senior Vice President of Business Development at OPSWAT. “Integrating SentinelOne’s AI detections strengthens Metascan’s multilayered defense, giving our customers faster, smarter protection against today’s most sophisticated threats.”

The inclusion of SentinelOne’s AI/ML detections in Metascan Multiscanning provides unmatched malware detection through simultaneous scanning with over 30 leading anti-malware engines, utilizing signature, heuristic, and machine learning techniques to achieve over 99% detection accuracy. The inclusion of SentinelOne’s AI/ML detections further amplifies this capability by identifying threats that bypass traditional defenses, such as polymorphic malware.

“Our collaboration with OPSWAT reflects a shared commitment to strengthening cybersecurity through innovation,” said Melissa K. Smith, vice president, strategic technology partnerships and initiatives, SentinelOne. “By integrating our AI/ML detections with Metascan Multiscanning, we’re delivering joint value that helps organizations elevate their threat detection strategies and better protect critical infrastructure across complex environments.”

This integration is available immediately as part of the latest Metascan Multiscanning release and supports key OPSWAT products both on-premises and cloud, including MetaDefender Core, MetaDefender ICAP Server, and MetaDefender Kiosk.

2, Jul 2025
Elevate Your Kitchen with Hindware Smart Appliances Carmela BLDC AutoClean Chimney

Step into a new era of smart kitchen living with the Hindware Carmela BLDC Auto‑Clean Chimney, a sleek, high-performance solution crafted for today’s modern homes. Designed to complement contemporary kitchen aesthetics while elevating everyday cooking experiences, the Carmela BLDC Chimney combines powerful performance with user-friendly innovation.

carmela

Powered by a 1500 m³/hr suction capacity, driven by an energy-efficient BLDC (Brushless Direct Current) motor, the inclined wall-mounted chimney efficiently removes smoke, grease, and odours, keeping your kitchen fresh even during intense cooking. Furthermore, its advanced thermal auto-clean technology eliminates the need for manual cleaning, effortlessly removing grease buildup at the touch of a button.

Featuring a filterless design with automatic louvre opening, it ensures consistent airflow and eliminates clogged filters, so you get reliable performance and a healthier kitchen. With nine speed levels, it adapts seamlessly to varied cooking styles, while bright, energy-saving LED lamps keep your workspace well-lit.

The Intuitive motion-sensing touch control ensures smooth operation even with messy hands, offering both convenience and control. A stylish, sleek, curved black finish and inclined profile not only adds a sophisticated edge to your kitchen décor but also maximizes headroom and workspace.

Built for longevity, the Carmela BLDC Chimney is backed by a comprehensive 3-year warranty and a 12-year warranty on the BLDC motor.

2, Jul 2025
Email Phishing Analysis: A SOC Analyst’s Guide to Spotting Suspicious Emails

In the ever-evolving landscape of cyber threats, phishing emails remain one of the most persistent and damaging attack vectors faced by organizations globally. Disguised as legitimate communications – ranging from invoices and HR updates to alerts from senior leadership—these malicious messages aim to manipulate unsuspecting recipients into compromising sensitive data or systems.

This comprehensive guide, developed by 5Tattva, serves as a critical resource for SOC Analysts, offering a structured and methodical approach to spotting suspicious emails before they escalate into full-fledged security incidents. At 5Tattva, we believe that empowering analysts with practical knowledge and actionable insights is the first line of defense against phishing.

  • The first line of defense lies in analyzing the sender’s identity. Phishing emails often use spoofed or misleading display names, masking the true nature of the sender. That “CEO” email? Might actually be a scammer named Rahul using a burner Gmail. A closer look at the full email address and domain can reveal subtle red flags – such as slight misspellings (like @paypa1.com instead of @paypal.com) or newly registered domains. A quick background check on the domain’s age and legitimacy, paired with a logical assessment of whether the sender would realistically be contacting you, can provide early warnings.
  • Subject lines are another telltale sign. Phishing attempts frequently use emotionally charged or urgent phrases like “URGENT: Account Locked!” or “Payroll Issue – Immediate Action Required” or “You won a $500 gift card.” The goal is to trigger panic or curiosity, rushing the recipient into acting without due diligence. You should remain wary of anything that feels manipulative, especially if it’s unexpected or overly dramatic.
  • Once inside the email, the body often reveals even more. Links should always be hovered over—never clicked—so analysts can inspect the real destination URL. Suspicious attachments, particularly ZIP files or Microsoft Word documents, should be examined in isolated environments to avoid triggering potential malware. Language inconsistencies, robotic phrasing, or uncharacteristic tone shifts from known contacts can all indicate a phish in action.
  • To dig deeper, you should examine the email headers and routing information. This technical metadata provides insight into where the email originated and the path it traveled. You should ensure that the “From,” “Reply-To,” and “Return-Path” fields align. If they don’t—or if the sender claims to be local but the IP address originates from a foreign country—it’s a red flag. For example, if the sender claims to be your HR department but the reply address is scammyboy@fraudmail.com, something’s up. Tracking the email’s “Received” lines can also help identify unusual or suspicious mail flow patterns.
  •  Email authentication protocols add another critical layer of verification. SPF (Sender Policy Framework) checks whether a mail server is authorized to send on behalf of a domain, while DKIM (DomainKeys Identified Mail) confirms that the email hasn’t been tampered with in transit. DMARC (Domain-based Message Authentication, Reporting & Conformance) builds on both, directing email servers on how to handle failures and providing reports to domain owners. Meanwhile, BIMI (Brand Indicators for Message Identification), though not a security protocol, adds brand trust by displaying a verified logo beside authenticated emails.
  • Once a phishing attempt is confirmed, swift action is vital. You should document all indicators of compromise (IOCs), alert relevant stakeholders, remove the email from inboxes, and block the malicious domain. An internal audit should follow to assess if any users interacted with the message. Most importantly, the incident should be transformed into a teachable moment for the broader organization.

“Phishing attacks are evolving faster than ever, but with the right processes, vigilance, and user awareness & trainings / Simulations, organizations can transform these threats into opportunities for education and improvement. At 5Tattva, we strive to equip every SOC analyst with not just tools, but the mindset of a proactive defender, “said Manpreet Singh, Co-Founder & Principal Consultant at 5Tattva and Chief Revenue Officer of Zeroday Ops

Phishing is no longer just an IT problem—it’s an organizational risk that demands constant vigilance and knowledge-sharing. With guides like this from 5Tattva, SOC analysts can stay ahead in this digital cat-and-mouse game, protecting the integrity of enterprise communications and ensuring cyber resilience in a dynamic threat landscape.

1, Jul 2025
Nikhil Kamath Hosts Nikesh Arora on People by WTF to Explore the Future of AI, Cybersecurity, and Leadership

National, India, 1 July , 2025 – In the latest episode of People by WTF, investor and entrepreneur Nikhil Kamath sits down with Nikesh Arora, CEO and Chairman of Palo Alto Networks, for an unfiltered conversation on the future of cybersecurity, artificial intelligence, lessons learned under Larry Page and Masayoshi Son, quantum computing, and what it takes to lead in a world moving 10X faster.

Spanning personal stories, bold predictions, and strategic insight, the episode is essential listening for entrepreneurs, tech leaders, policymakers, and investors alike. Highlights include:

  1. Growing up, rejection letters and boardrooms: Nikhil Kamath opens the conversation by asking Nikesh Arora to start “where it matters most,” sparking a candid look at childhood, rejection, and resilience. Arora credits a “blessed” upbringing to his father’s unwavering integrity, his mother’s academic focus, and constant Air Force relocations that taught him to adapt quickly and says, “When you’ve packed up and moved all your life, change feels natural.” Nikesh shares his academic and early career journey, one shaped as much by detours as by degrees. With a resume spanning IIT-BHU, Boston College, and Northeastern, he jokes, “I wasn’t smart enough,” recalling how he left the CAT exam midway to catch a movie. The real turning point came during the 1992 recession: “I wrote 400 plus letters to people applying for a job… sometimes a printer ran out of ink, but I knew it was a rejection letter.” He still keeps every one of those 400 rejections. Despite being voted “most likely to end up on Wall Street,” banks passed him over, until Fidelity gave him a shot. “I had seven rejection letters from Fidelity before I got a job for the eighth person. So thank God they weren’t comparing notes.”
  2. Hacktivists to Heists: The Cyber Shift: Nikesh Arora traces the evolution of cyber threats, highlighting how hacktivism has morphed into a global criminal economy driven by prestige and profit. “There is a general belief that most security companies and now infrastructure software companies are constantly attacked,” he notes. With attacks often paid in untraceable cryptocurrency, “hacking has become the Wild West.” As over $10 billion is extorted annually, cybercrime now rivals global conflict. Citing the Russia-Ukraine war, Arora warns: “We think most future wars are part cyber wars and part technology wars.” Cybersecurity, he emphasizes, is no longer just about protecting IT, it’s a frontline of national and global defense.
  3. Agentic AI and the New Cyber Frontiers: Nikhil explores how investors and entrepreneurs can spot the next big cybersecurity bets, asking, “How does one evaluate exposure to cybersecurity, what should we be looking for?” Nikesh points to emerging “attack vectors” as high-opportunity zones and shares, “The most likely categories which will see outsized returns are categories where a new attack vector is being born.” One such vector is agentic AI, autonomous systems acting on our behalf, which Nikesh says introduces massive risk. “If you trust AI to do all of that for you and show up blindly, that would be called giving agency to that agent. I don’t think we’re ready as human beings to let even that basic agency.” He warns, “Those agents will allow you to act on behalf of whoever’s agent you’ve taken over,” creating a new class of threats. 
  4. Zerodha and the Agentic AI Shift: Nikhil Kamath questions whether platforms like Zerodha, built on trust, regulation, and user interface, can remain dominant as agentic AI begins to reshape software interaction. “Can systems of record persist only because they’re regulated, or will decentralised models driven by trust take over?”. Nikesh Arora agrees that such platforms function as foundational infrastructure. “A system of record is almost like something that is built over time. Either it’s mandated by regulation, mandated by enterprises. If a payroll system goes away tomorrow, you wouldn’t know how much you paid someone and how much you have to pay them.” He adds, “It’s too painful for you to replace that system of record.” But he cautions that survival will depend on evolution, mentioning, There is a prevailing theory that the big will become bigger. If they are smart enough and fast enough and agile enough to be able to change the mode of interaction with the system of record.”
  5. Democratized AI vs. Decades of Brand Trust: Nikhil Kamath poses a question: If AI democratizes intelligence, will brand loyalty still matter? “So if AI becomes democratic, how big does the role of a brand play in something like this? Is it just utilitarian or is there a brand play involved?” Nikesh Arora affirms the enduring power of brand, arguing it’s built on more than data. “Brands are correlated experiences and trust and perception… the brand encompasses a lot more than the raw material from that person. I don’t know how democratization of AI changes that.” While AI may erode information asymmetry, “Historically, a lot of power has been because of an information disadvantage or asymmetry”, he believes the future advantage lies in proprietary data and solving unknown problems. “The domain-specific, capital-intensive AI is going to be the future… and it’s going to evolve 1,000x faster than anything we’ve seen before.”
  6. AI Isn’t the End, It’s the Beginning of What’s Next: Nikhil invites Nikesh to imagine what the world might look like a decade from now, probing for a vision shaped by AI and technological shifts. Nikesh resists crystal-ball predictions, instead offering a grounded perspective on uncertainty and adaptability. He reflects on how past crises, like the pandemic, brought fears of collapse, yet humanity adapted and moved on. “I don’t see anybody digging up the ground to plant wheat. Things have happened and we all found something else to do.” Rather than fearing what lies ahead, Nikesh believes in embracing progress. He emphasizes that as old problems are solved, new avenues of innovation and opportunity will emerge. “I’m sure we’ll find ways to propel society further and I’m sure things that get solved easily will create new opportunities.” His message is clear: stay optimistic, stay agile.
  7. Nikesh’s Playbook for Future Founders: Nikhil asks Nikesh what advice he would offer to young founders starting out today, whether or not they’re in cybersecurity. Nikesh responds candidly, acknowledging a role reversal: he now finds himself learning from the younger generation. He highlights that startups today are moving faster than ever, building AI-powered products in record time and reaching massive scale with lean teams. “The wave of technology that is coming is going to allow people to build businesses faster, more agility, a lower number of people and fundamentally rethink them.” He stresses the importance of ambition and bold thinking. In an era of exponential change, incremental improvements won’t cut it. “If your rethink is marginal, if you’re looking for a 10, 20% improvement, don’t bother because things are about to move 10X… If your idea is not 10X worthy, you’re solving the wrong problem.”
  8. Should India Build Its Own AI Model?: Nikhil poses a critical question: should India build its own foundational AI model, especially in a world where geopolitics increasingly shape access to technology? Nikesh agrees in principle but outlines major hurdles. “We should. The question then becomes, is a CapEx question?” He highlights that India has historically avoided large, high-risk capital projects, building a frontier AI model could cost tens of billions, and there’s limited appetite for that scale of investment. You can’t walk around and raise $50 billion and build two nuclear plants to fund AGI today, irrespective of who you are and irrespective of who your investors are from the Indian subcontinent.” While open-source models are an option, Nikhil adds a geopolitical lens: “In a world which is getting increasingly fragmented… if somebody turns off a tap that we have built so much upon, what happens then?” To this, Nikesh offers cautious optimism. India’s large, tech-savvy population makes it a crucial market for global AI players. “There will always be the possibility of collaborating with a model somewhere in the world, with 1.8 billion people, that it’d be silly to ignore that market.” While building a sovereign model may not be immediately feasible, Nikesh affirms its strategic importance: “The unequivocal answer is, yes, we should in India.” The real challenge lies in aligning capital, talent, and infrastructure to make it happen.
  9. AI Gold Rush or Bubble?: Nikhil asks, “If you invested a dollar in every AI company today, would it pay off in a decade, or is it all overhyped?” Nikesh breaks it down. In the short term, success depends on execution, and many AI startups are burning cash and banking on sky-high valuations. “Clearly there is a gold rush,” he notes. But long term, he’s bullish: AI can drive massive efficiency, reduce costs, and democratize intelligence. Still, he cautions, it’s uncertain which companies will last. The opportunity is real—but so is the noise.
  10. India, Failure, and Culture: What We Can Learn from Israel: Nikhil asks what holds back India’s innovation potential despite its talent. He reflects on how, despite the talent, India still struggles to scale breakthrough ideas, especially compared to startup ecosystems like the U.S. or Israel. Nikesh shares, “I think it boils down to a combination of things. It’s part talent and resources. It’s part infrastructure, it’s part availability, all of that is part ease of doing business.” He emphasizes one key missing ingredient: cultural acceptance of failure. “I  think it’s also partly the acceptance of failure. Failure is not as easily accepted anywhere in the world, but in Silicon Valley, the market gives them the benefit of doubt and funds them again and again.” He contrasts this with Israel and shares, “Israel, they feel very lucky if they build a billion dollar company… So there’s a lot of cultural stuff in there. There’s a lot of cultural acceptance of failure, cultural sort of role modeling.” He notes that over half the 20+ startups he acquired in the last seven years came from Israel. *DISCLAIMER: This conversation was recorded prior to the current conflict involving Israel and Iran.
  11. Founders vs. Builders: What Personality Wins in Tech? Nikhil explores the difference between founders and non-founder tech leaders, asking what personality fits each path. He asks, “How do you think those journeys are different and what kind of personality type is suited for which?” Nikesh reflects on his own journey, straddling tech and business from IIT to Putnam and says founders often have a “moral right” to build long-term visions. He further adds, vision alone isn’t enough, “A product-only company is not a company, it needs a business around it.” He stresses that leadership is less about individual brilliance and more about assembling the right team. “Part of winning means surrounding yourself with the right intermix of people.” Nikesh credits his success to pairing with strong technical partners and bringing in risk appetite. When asked if hiring defines a leader, he agrees, but adds, “Hiring is just the beginning. You have to keep your eye on the North Star, it tends to move sometimes.”
  12. Lessons from Larry Page and Masayoshi Son: Nikhil asks Nikesh to share what he learned from working closely with Larry Page and Masayoshi Son. Nikesh begins by challenging the idea of idolizing role models entirely. “I believe in the concept of admiring people for something that they’re really good at. I look for traits in different people and try to learn from them.”, he shares. Nikesh shares that from Larry Page, he learned the power of product obsession. In their first one-on-one, Larry said, “I’m sure if I had a few hours, I could help you do your job 20% better. Let me know when you have two hours.” The point stuck, and Nikesh highlights that “Companies that lose sight of product eventually fail.” From Masa Son, it was about unlearning fear. While Indian culture teaches risk aversion, Masa was the opposite – relentlessly bold, endlessly curious, and all-in every day. “Every entrepreneur was trying to take risks to build a stable business. Masa kept taking bigger risks even after getting rich. He was the richest man in the world for a few days, and then he was almost bankrupt. So you learn that risk appetite is actually something we govern, but it is significantly influenced culturally.”
30, Jun 2025
BonV Aero Scales Workforce by 45% to Accelerate India’s Aerospace Breakthroughs

BonV Aero, a leading indigenous OEM in India’s aerospace sector, has expanded its full-time workforce by 45% in the first half of 2025, reflecting the company’s steady growth and mission to advance electric aviation and high-payload aerial mobility solutions.

This expansion encompasses critical departments, including software development, flight testing, regulatory compliance, business development, manufacturing, and quality control. In parallel, BonV Aero has also scaled its early talent development pipeline, with its internship cohort growing by 316% by engaging interns across various functions. This aligns with its broader strategy to nurture future-ready talent for India’s aerospace innovation ecosystem.

“Our in-house learning ecosystem, built entirely without external trainers, has helped us significantly optimise costs while deepening technical capability across teams,” said Rahul Kumar, Co-founder & Head of Design, BonV Aero. This includes internal workshops in collaboration with defence institutions and industry experts, covering mission planning, autonomous systems, and logistics drone operations.

“Our HR strategy goes beyond hiring. We’re building capacity for long-term sovereign innovation,” added Satyabrata Satapathy, Co-founder & CEO, BonV Aero. “Whether it’s disaster response, defence logistics, or new-age transport, our focus remains on building a talent engine that serves India’s national goals.”

Looking ahead, BonV Aero aims to double its full-time workforce by 2026. Recruitment will focus on avionics, quality assurance, inventory, compliance, and embedded systems. To support this growth, the company is planning infrastructure upgrades, including new R&D labs and expanded flight-testing facilities.