fp-1a
-
Discover how the TamperedChef malware uses a fake PDF editor to steal login credentials and sensitive data in a widespread 2025 cyberattack.
-
Explore how the Underground ransomware gang is enhancing tactics against global organizations, using advanced encryption and targeted attacks.
-
Posted: August 27, 2025Views: 8Discover how fake loan apps in India are trapping users in harassment and blackmail. Learn about the global network behind these predatory practices and the ongoing regulatory challenges.
-
Discover how the RBI and NPCI are leveraging AI to combat the rise in digital fraud in India. Learn about new initiatives and the challenges ahead.
-
The Indian government has introduced a new policy for secure sharing of transport data through the National Transport Repository. Learn about the guidelines, affected platforms, and privacy measures.
-
Discover PhantomCard, a sophisticated NFC-based Trojan targeting banking customers in Brazil. Learn how this malware exploits NFC relay attacks to steal sensitive card data and facilitate unauthorized transactions.
-
Learn about the emerging ghost-tapping technique that exploits stolen payment card details linked to Apple Pay and Google Pay. Discover how this method facilitates retail fraud and the impact on users.
-
Discover how cybercriminals are exploiting brokerage accounts in sophisticated ‘ramp and dump’ schemes using mobile phishing tactics. Learn about the risks and how to protect yourself.
-
A new Android phishing campaign is deceiving Indian users by posing as the PM Surya Ghar: Muft Bijli Yojana. Learn how attackers exploit this scheme to install malware and steal sensitive banking information.
-
Allianz Life confirms a major data breach affecting 1.1 million customers. Learn about the stolen information, the hacking group behind the attack, and the risks of identity theft.