fp-1a
-
Read moreA Florida woman was tricked out of ₹12.5 lakh ($15,000) by scammers who cloned her daughter's voice in a deepfake emergency scam. Learn about this rising threat of AI-powered voice fraud.
-
Read moreTwo critical zero-day vulnerabilities in Trend Micro Apex One (on-prem) devices, CVE-2025-54948 and CVE-2025-54987, are being exploited in the wild. Learn about their impact and mitigation strategies.
-
Read moreA 32-year-old software engineer from Bengaluru was defrauded of ₹55.64 lakh by a cybercriminal posing as a prospective bride on a matrimonial portal. Learn how the scam unfolded.
-
Read moreSecurity researchers demonstrate how Google's Gemini AI bot can be hijacked to control smart home devices using invisible prompts. Learn about the implications for generative AI security.
-
Read moreDiscover critical pre-auth vulnerabilities in Adobe Experience Manager Forms identified by the Searchlight Cyber Research Team. Learn about the risks and recommended actions to secure your deployment.
-
Read moreIn 2024, over 84,000 online gaming accounts were leaked in India, according to Kaspersky. Discover the impact of this data breach and the state of gaming security in the APAC region.
-
Posted: August 05, 2025Views: 54Read moreA Hyderabad housewife lost ₹1.61 crore to cyber scammers posing as employers. Discover how the scam unfolded and the steps taken by police to investigate.
-
Read moreDiscover the critical vulnerability in Cursor IDE, known as 'CurXecute,' that enables remote code execution without user interaction. Learn about the risks and necessary updates.
-
Read moreExplore the rising threat of ransomware in India's aviation industry. Learn how digital transformation increases vulnerability and the potential impact on air travel safety and operations.
-
Read moreDiscover how the PlayPraetor Android Trojan has infected over 11,000 devices through fake Google Play pages and Meta Ads. Learn about its functionalities and impact on users.