Cyber Attack
-
A cyber attack by Pakistani hackers on NIT Jamshedpur's official website displayed anti-India sentiments. Learn about the incident, its implications, and the ongoing investigation into the breach.
-
Posted: July 25, 2025Views: 22A new malware campaign exploits users' trust in financial institutions by using weaponized LNK files disguised as credit card security emails. Learn how this sophisticated attack operates.
-
A new variant of the macOS.ZuRu malware exploits a compromised Termius SSH client to turn developer workstations into remote access points. Learn about the risks and how to protect your systems.
-
Novabev Group confirmed a ransomware attack on July 14, 2025, disrupting operations and IT infrastructure. The company refuses to pay ransom and assures customer data remains secure.
-
Posted: July 24, 2025Views: 30Lucknow police have arrested 16 individuals and seized ₹1.07 crore in cash during a major cyber-fraud bust linked to a fake betting app, 'Lotus Gaming.' Discover the details of this online scam.
-
Cybersecurity researchers reveal a campaign targeting poorly secured Linux servers through SSH brute force attacks to deploy the SVF Botnet, a Python-based DDoS malware using Discord for command-and-control.
-
Iranian state-backed APT groups are intensifying cyber operations, leveraging AI-generated emails to target cybersecurity researchers. Learn about their tactics and the implications for global security.
-
Posted: July 23, 2025Views: 17India faces a staggering loss of ₹1,500 crore monthly due to cyber scams originating from Southeast Asia. Discover the impact of these frauds, their origins, and the challenges in combating them.
-
A sophisticated phishing campaign is targeting Node.js developers through a typosquatted domain, npnjs.com. Learn how attackers are impersonating the npm package registry and what you can do to protect your credentials.
-
Discover how Fancy Bear (APT28), a sophisticated Russian cyberespionage group, infiltrates governments and military organizations using advanced cyber tools and tactics. Learn about their methods, motivations, and recent activities.