Blogs
-
Researchers found 8 malicious NPM packages targeting Windows Chrome users with obfuscated code to steal passwords, credit cards, and crypto wallets. Learn more.
-
Learn about the critical Sangoma FreePBX authentication bypass vulnerability that risks remote code execution and how to protect your system.
-
Discover how Sindoor Dropper malware uses weaponized .desktop files to infect Linux systems via spear-phishing and deploys MeshAgent RAT.
-
Discover how AI-generated ransomware bypasses antivirus software, posing new cybersecurity risks in 2025 and challenging traditional defenses.
-
Discover how the TamperedChef malware uses a fake PDF editor to steal login credentials and sensitive data in a widespread 2025 cyberattack.
-
Discover PromptLock, the first AI-powered ransomware using OpenAI's gpt-oss:20b model, enabling sophisticated attacks across multiple platforms.
-
Explore how the Underground ransomware gang is enhancing tactics against global organizations, using advanced encryption and targeted attacks.
-
Discover how the Salesloft OAuth breach compromised Salesforce customer data through the Drift AI chat agent, affecting over 700 organizations.
-
Posted: August 27, 2025Views: 9Discover how fake loan apps in India are trapping users in harassment and blackmail. Learn about the global network behind these predatory practices and the ongoing regulatory challenges.
-
Discover how a malicious Go module masquerading as an SSH brute-force tool exfiltrates credentials to a Telegram bot. Learn about its key features and the threat it poses.
-
Zimperium’s zLabs has uncovered a new variant of the Hook Android banking trojan, featuring ransomware-style overlays and advanced credential theft tactics. Learn about its key features and technical insights.
-
Adversaries are misusing AI-powered website builders like Lovable to create malicious infrastructure for malware distribution and credential phishing. Discover the emerging threats and how organizations can protect themselves.
-
French retailer Auchan has announced a cyberattack that compromised loyalty account information for hundreds of thousands of customers. Learn about the breach, its implications, and the company's response.
-
A large-scale scanning campaign is targeting Microsoft Remote Desktop Protocol (RDP) services, utilizing over 30,000 unique IP addresses. Learn about the attack's methodology and implications for credential-based attacks.
-
Discover critical vulnerabilities in Citrix Session Recording that pose risks to organizations. Learn about improper privilege management and deserialization flaws, along with recommended mitigation actions.
-
Discover the PROMISQROUTE vulnerability in ChatGPT-5 that allows hackers to bypass AI defenses using simple prompt modifications. Learn about the implications for AI security.
-
Discover how the RBI and NPCI are leveraging AI to combat the rise in digital fraud in India. Learn about new initiatives and the challenges ahead.
-
Join us in celebrating 34 years of Linux! Discover its journey from a hobby project to a powerhouse in computing, powering smartphones, supercomputers, and more.
-
The Indian government has introduced a new policy for secure sharing of transport data through the National Transport Repository. Learn about the guidelines, affected platforms, and privacy measures.
-
Apple has released critical updates to address CVE-2025-43300, a zero-day vulnerability affecting iOS, iPadOS, and macOS. Learn about the impact, affected devices, and how to stay secure.