Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
Trellix Source Code Breach: Hackers Access Repository
May 2, 2026
Hackers Exploit cPanel Flaw to Breach Government Military
May 2, 2026
Exim Mail Server Vulnerabilities Lead to Crash via DNS Data
May 2, 2026
Home/CyberSecurity News/India to Ban Sale of Hikvision, TP-Link, CCTV Products
CyberSecurity News

India to Ban Sale of Hikvision, TP-Link, CCTV Products

Effective April 1, 2026, India will impose a ban on Chinese video surveillance giants such as Hikvision, Dahua, and TP-Link, preventing them from selling internet-connected CCTV cameras within the...

Sarah simpson
Sarah simpson
March 30, 2026 2 Min Read
0 0

Effective April 1, 2026, India will impose a ban on Chinese video surveillance giants such as Hikvision, Dahua, and TP-Link, preventing them from selling internet-connected CCTV cameras within the nation.

This decisive market restriction stems from new mandatory certification rules driven by national security concerns regarding foreign hardware.

The Ministry of Electronics and Information Technology (MeitY) has implemented strict Standardisation Testing and Quality Certification (STQC) requirements for all internet-connected surveillance equipment under the IS 13252-1 cybersecurity standard to mitigate foreign espionage risks.

Under these comprehensive guidelines, manufacturers must explicitly disclose the country of origin for critical System-on-Chip (SoC) architectures, and the government is actively denying certification to any products utilizing Chinese-origin chipsets to prevent unauthorized remote access vulnerabilities.

Furthermore, vendors must pass rigorous laboratory testing, ensuring secure TLS/HTTPS communication and uniform patch management; without this critical security clearance, their hardware is completely barred from being imported or sold in the Indian market.

Domestic Market Restructuring

According to Economic Times, sweeping regulatory overhaul has fundamentally reshaped the Indian video surveillance landscape, heavily favoring the domestic “Make in India” initiative while forcing out entrenched Chinese brands that previously commanded a third of total national sales.

Domestic manufacturers such as CP Plus, Qubo, Prama, Matrix, and Sparsh have completely restructured their hardware supply chains to ensure strict compliance, abandoning prohibited Chinese components in favor of secure Taiwanese chipsets and utilizing heavily localized proprietary firmware.

As a result of this rapid strategic shift and proactive adaptation, Indian brands have aggressively captured over 80% of the total market share as of early 2026, relegating established multinational corporations like Bosch and Honeywell to specialized premium enterprise segments.

The transition away from highly subsidized Chinese surveillance hardware has introduced notable economic ramifications for both direct consumers and massive enterprise deployments, driving a 15% to 20% price increase across mid-range and high-end camera segments as manufacturers absorb the costs of alternative Taiwanese components and rigorous compliance testing.

Cybersecurity professionals and domestic industry leaders have widely praised the government’s initiative, viewing the stringent hardware mandates as a critical, overdue victory for national data sovereignty and physical infrastructure security.

However, skeptics have voiced localized concerns regarding the long-term operational reliability of these rapidly scaled domestic alternatives, while Chinese stakeholders and international observers have continuously criticized the abrupt regulatory shift as a maneuver rooted in trade protectionism rather than purely technical security.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

CybersecurityPatchSecurity

Share Article

Sarah simpson

Sarah simpson

Sarah is a cybersecurity journalist specializing in threat intelligence and malware analysis. With over 8 years of experience covering APT groups, zero-day exploits, and advanced persistent threats, Sarah brings deep technical expertise to breaking cybersecurity news. Previously, she worked as a security researcher at leading threat intelligence firms, where she analyzed malware samples and tracked cybercriminal operations. Sarah holds a Master's degree in Computer Science with a focus on cybersecurity and is a regular contributor to major security conferences.

Previous Post

Prompt Poaching Attack Steals AI Chats via Malicious Extensions

Next Post

Critical Fortinet FortiClient EMS Vulnerability Exploited Attacks

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
cPanelSniper PoC Exploit for cPanel Vulner Disclosed Vulnerability
May 2, 2026
EtherRAT Targets Enterprise Admins with SEO Poison
May 1, 2026
New Spyware Platform: Rebrand & Resell Android Lets Buyers
May 1, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Sarah simpson
Sarah simpson
Emy Elsamnoudy
Emy Elsamnoudy
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us