Blogs
-
Discover how the Pakistan-linked APT36 group is targeting Indian railways and government systems using malicious PDF files. Learn about their sophisticated infection chains and phishing tactics.
-
Discover how phishing scams are targeting users through WhatsApp messages, including a recent HDFC Bank impersonation attempt. Learn how to protect yourself with FraudProtector.Net.
-
A series of data breaches linked to the ShinyHunters group has affected major companies like Qantas and LVMH. Learn how voice phishing techniques compromised Salesforce CRM systems and the implications for data security.
-
Anubis ransomware, first detected in November 2024, targets both Android and Windows platforms, utilizing a ransomware-as-a-service model. Learn about its tactics, high-profile attacks, and how to defend against this emerging threat.
-
The maritime industry faces a surge in ransomware attacks from APT groups, with over 100 cyberattacks reported in the past year. Learn about the tactics used by hackers and the implications for global trade.
-
Sonatype reveals a cyber infiltration campaign by the North Korea-backed Lazarus Group, targeting CI/CD pipelines with malicious packages. Learn about the implications for open-source security.
-
A cybercriminal known as Tsar0Byte claims to have breached Nokia's internal network, stealing sensitive data of over 94,500 employees. Learn about the implications and exposed information.
-
ToxicPanda, a sophisticated Android banking trojan, has infected over 4,500 devices in Europe, targeting banking apps to steal credentials. Learn about its techniques and impact.
-
A recent cyberattack on a US chemicals company exploited the SAP NetWeaver vulnerability CVE-2025-31324 to deploy Auto-Color malware. Learn about the attack details and key takeaways.
-
SonicWall has identified critical vulnerabilities in its SMA 100 series SSL-VPN appliances, allowing remote code execution. Learn about the risks and recommended actions to secure your systems.
-
A significant data breach at the Tea dating app has compromised the private data of over 11 million female users, including selfies and IDs. Learn more about this serious privacy violation.
-
Discover Shuyal, a newly identified stealer malware targeting 19 browsers, including Tor and Brave. Learn how it extracts sensitive data and poses a significant threat to your security.
-
Discover the CSRF vulnerability in PaperCut NG/MF that could allow attackers to modify security settings or execute arbitrary code. Learn about recommended actions to mitigate risks.
-
Net Protector Endpoint Security (EDR) by Biz Secure Labs Pvt. Ltd. has earned the prestigious VB100 certification, achieving a 99.08% malware detection rate and a 0.041% false alarm rate. Discover the key highlights of this certification.
-
Aeroflot canceled over 40 flights due to a cyberattack claimed by the pro-Ukrainian hacker group Silent Crow. Learn about the impact on operations and the response from Russian authorities.
-
Learn about the injection vulnerability in Cisco Identity Services Engine (ISE) that could allow remote code execution. Discover recommended actions to mitigate risks and protect your network.
-
A single compromised password caused the downfall of KNP Logistics, a 158-year-old company, leaving 730 employees jobless. Learn about the Akira ransomware attack and its implications for UK businesses.
-
A security breach in Amazon's Q Developer Extension for Visual Studio Code affected nearly one million users. Learn how a hacker injected malicious code and what steps Amazon took to resolve the issue.
-
Discover the new Gunra ransomware targeting Windows systems, encrypting files, and deleting shadow copies. Learn about its origins, tactics, and how organizations can defend against this emerging threat.
-
A cyber attack by Pakistani hackers on NIT Jamshedpur's official website displayed anti-India sentiments. Learn about the incident, its implications, and the ongoing investigation into the breach.