Blogs
-
Read moreIvanti’s September 2025 security bulletin addresses 13 vulnerabilities in Endpoint Manager, Connect Secure, Policy Secure, ZTA Gateways, and Neurons for Secure Access. No known exploitation reported.
-
Read moreA deserialization of untrusted data vulnerability in Dassault Systèmes DELMIA Apriso could allow remote code execution. Learn recommended actions to protect your systems.
-
Posted: September 12, 2025Views: 15Read moreA retired railway engineer was defrauded of ₹18.45 lakh after cybercriminals hacked his phone through a fake pension correction call. Authorities are investigating the growing threat of cyber scams targeting senior citizens.
-
Read moreIndia’s MSMEs must comply with new CERT-In rules requiring yearly cybersecurity audits, incident reporting, and employee training to strengthen digital defenses and protect the economy.
-
Read moreMalicious browser extensions SocialMetrics Pro and Madgicx Plus steal Facebook session cookies and credentials to hijack Meta Business accounts. Learn how these fake tools target advertisers via malvertising and fake websites.
-
Read moreFastNetMon detected and helped stop a massive 1.5 billion packets-per-second UDP flood targeting a Western European DDoS mitigation provider. Learn about this record-breaking attack and defense strategies.
-
Read moreA remote code execution flaw in Cursor AI Code Editor allows malicious code to run automatically when opening a project. Learn how disabling Workspace Trust exposes developers and how to protect your environment.
-
Read moreMicrosoft’s September 2025 Patch Tuesday addresses 81 security flaws, including two publicly disclosed zero-day vulnerabilities in SMB Server and Microsoft SQL Server. Learn about critical updates and other vendor patches.
-
Read moreSpamGPT is a dark web “spam-as-a-service” platform using AI to automate large-scale phishing campaigns. Learn how KaliGPT and SMTP cracking training empower cybercriminals.
-
Posted: September 09, 2025Views: 11Read moreAssistant Sub-Inspector Om Parkash lost Rs 3.9 lakh after calling fake customer care numbers found on Google. Learn how scammers exploit search results and how to protect yourself.
-
Read moreCybercriminals abused compromised AWS credentials to hijack Amazon SES, sending 50,000+ phishing emails daily by bypassing sandbox limits. Learn how to detect and prevent SES abuse.
-
Read moreA severe remote code execution vulnerability in Progress OpenEdge AdminServer’s Java RMI interface (CVE-2025-7388) lets attackers execute commands with elevated privileges. Update to LTS versions 12.2.18 or 12.8.9 immediately.
-
Read moreA high-severity COOP vulnerability in pgAdmin4 (up to version 9.7) enables attackers to bypass authentication and hijack accounts. Update to version 9.8 immediately to protect your PostgreSQL environment.
-
Read moreCybercriminals use a fake Microsoft Teams download site to distribute the Odyssey macOS stealer, stealing credentials, crypto wallets, and sensitive data. Learn how to protect your Mac.
-
Read moreUrgent patch required for Sitecore XP vulnerability CVE-2025-53690 enabling remote code execution. Update before September 25, 2025 to prevent attacks.
-
Read moreCybercriminals use X’s AI assistant Grok to bypass ad restrictions and distribute malware through hidden links, reaching millions. Learn about the “Grokking” technique and its impact.
-
Read moreQantas penalizes CEO Vanessa Hudson and top executives nearly A$800,000 (₹44.8 crore) in pay cuts following a cyberattack affecting 5.7 million customers. Learn about the breach, response, and governance reforms.
-
Read moreChess.com confirms a data breach affecting 4,541 users, with hackers accessing personal information. Learn about the incident, user notifications, and security measures underway.
-
Read moreBridgestone Americas confirms a cyberattack impacting multiple North American plants. Investigation ongoing, but customer and employee data remain secure. Learn more about the incident and response.
-
Read moreA use-after-free flaw in Android Runtime may allow Chrome sandbox escape and local privilege escalation. Learn about mitigation steps and security recommendations to protect your device.