Hacker
-
A sophisticated cyber espionage campaign, dubbed "LapDogs," has compromised over 1,000 SOHO devices worldwide using a custom backdoor. Discover the tactics and implications of this covert operation linked to China.
-
Discover how the Confucius hacking group is targeting government and military entities with their advanced wooperstealer malware. Learn about their sophisticated techniques and the challenges they pose to cybersecurity.
-
North Korean hackers from the Famous Chollima group have launched a new Python-based RAT, PylangGhost, targeting Windows and macOS users in the cryptocurrency sector. Learn about the attack methods and implications.
-
In a significant international operation, law enforcement agencies have dismantled Archetyp Market, a major dark web marketplace for illicit drugs. Discover the details of this crackdown and its implications for the digital narcotics trade.
-
A new malware campaign exploits Discord's invite system to deliver AsyncRAT and Skuld Stealer, targeting crypto wallets. Learn how attackers hijack links and the risks involved.
-
Posted: June 12, 2025Categories: Bank Phishing, Data Breach, Hacking, Hacker, Banking Trojan, Financial fraud, Fraud ProtectorViews: 11The investigation into the ₹11.55 crore cyber fraud at Himachal Pradesh State Cooperative Bank has led to multiple arrests. Learn about the hacking incident, ongoing investigations, and cybersecurity measures.
-
Posted: June 09, 2025Views: 218Discover how OpenAI has banned ChatGPT accounts associated with Russian, Iranian, and Chinese hacker groups. Learn about the malicious activities, including malware development and social media manipulation, and explore the implications for cybersecurity.
-
Posted: September 30, 2024Comments: 3Views: 205Cyber fraudsters have devised a new tactic by misusing the 1930 toll-free helpline number, intended for reporting cybercrimes, to deceive unsuspecting individuals. In a recent case reported in Hyderabad, a complainant was duped of ₹29.55 lakh after being coerced into joining a fraudulent video call by criminals posing as law enforcement officials.
-
In the ever-expanding realm of cyber warfare, a shadowy player has emerged: “Mysterious Team Bangladesh.” This enigmatic group has been
-
Hackers are infecting devices with spyware malware that harvests call logs, texts, and GPS positions from phones by utilizing the