Data Breach
-
Discover the SparkKitty spyware campaign targeting iOS and Android devices through official app stores. Learn about its sophisticated techniques, objectives, and the risks it poses to mobile users.
-
Posted: June 19, 2025Views: 16Israel-linked hackers, Gonjeshke Darande, breach Iran's largest crypto exchange, Nobitex, leaking sensitive data and allegedly siphoning $90 million. Explore the implications for users and the digital economy.
-
Zoomcar Holdings, Inc. has reported a major data breach affecting 8.4 million users. Discover how the incident exposed sensitive personal information and the company's response to the cybersecurity threat.
-
Clicking “unsubscribe” in your email may seem harmless, but it could expose you to scams and security risks. Learn how cybercriminals exploit unsubscribe links and how to stay safe.
-
Discover how the VexTrio scam network exploits WordPress sites to distribute malware and fraudulent schemes. Learn about the tactics used and the impact on global cybersecurity.
-
Posted: June 12, 2025Categories: Bank Phishing, Data Breach, Hacking, Hacker, Banking Trojan, Financial fraud, Fraud ProtectorViews: 22The investigation into the ₹11.55 crore cyber fraud at Himachal Pradesh State Cooperative Bank has led to multiple arrests. Learn about the hacking incident, ongoing investigations, and cybersecurity measures.
-
GreyNoise warns of coordinated brute-force attacks on Apache Tomcat Manager interfaces, involving 295 malicious IPs. Learn about the risks and recommended security measures.
-
The Indian government has issued a high-severity alert regarding vulnerabilities in devices using MediaTek processors. Learn about affected devices, security risks, and recommended actions.
-
A new malware campaign disguised as an Instagram growth tool is stealing login credentials. Learn how "imad213" works and how to protect your account.
-
Posted: June 10, 2025Views: 25Discover how a China-linked cyber espionage group, including APT15 and UNC5174, targeted over 70 organizations across government, media, and other sectors. Learn about the malware used, including ShadowPad and GoReShell, and the exploited vulnerabilities.