Hacker
-
Cybercriminals compromised corporate systems in under five minutes by exploiting QuickAssist and PowerShell scripting. Learn how social engineering facilitated this rapid breach.
-
Cybercriminals are using free trials of Endpoint Detection and Response (EDR) software to disable existing security measures. Learn about the BYOEDR attack technique and its implications.
-
In 2024, over 84,000 online gaming accounts were leaked in India, according to Kaspersky. Discover the impact of this data breach and the state of gaming security in the APAC region.
-
Posted: August 05, 2025Views: 27A Hyderabad housewife lost ₹1.61 crore to cyber scammers posing as employers. Discover how the scam unfolded and the steps taken by police to investigate.
-
Discover critical vulnerabilities in NVIDIA's Triton Inference Server that allow unauthenticated attackers to execute code and take control of AI servers. Learn about the risks and necessary updates."
-
The maritime industry faces a surge in ransomware attacks from APT groups, with over 100 cyberattacks reported in the past year. Learn about the tactics used by hackers and the implications for global trade.
-
Sonatype reveals a cyber infiltration campaign by the North Korea-backed Lazarus Group, targeting CI/CD pipelines with malicious packages. Learn about the implications for open-source security.
-
A recent cyberattack on a US chemicals company exploited the SAP NetWeaver vulnerability CVE-2025-31324 to deploy Auto-Color malware. Learn about the attack details and key takeaways.
-
Aeroflot canceled over 40 flights due to a cyberattack claimed by the pro-Ukrainian hacker group Silent Crow. Learn about the impact on operations and the response from Russian authorities.
-
Cybersecurity researchers have uncovered a stealth backdoor in WordPress mu-plugins, allowing hackers to maintain persistent admin access. Learn how this malware operates and how to protect your site.