fp-1a
-
Read moreA critical Docker vulnerability (CVE-2026-34040) allows attackers to bypass authorization plugins and gain host access using crafted API requests.
-
Posted: April 08, 2026Views: 22Read moreIndian Bank alerts users about fake LPG payment and KYC scams spreading via WhatsApp and SMS to steal banking details and commit fraud.
-
Read moreNew GPUBreach attack uses RowHammer on GPU memory to gain full CPU access, bypassing protections and posing risks to AI and cloud systems.
-
Posted: April 06, 2026Views: 96Read moreDelhi Police busts ₹300 crore cyber fraud syndicate linked to fake investment apps, arrests mastermind and uncovers global scam network.
-
Posted: April 01, 2026Views: 82Read moreHackers exploit hotel booking systems to send fake payment requests via WhatsApp and email, using real reservation data to scam travelers worldwide.
-
Read moreNPAV’s Net Protector Endpoint Security-EDR earns VB100 certification with 97.59% malware detection and minimal false positives on Windows 11.
-
Read moreIndia plans to restrict Hikvision, Dahua, and TP-Link CCTV sales under new cybersecurity rules, boosting domestic surveillance brands and data security.
-
Read moreInfiniti Stealer is a new macOS malware spreading through fake Cloudflare CAPTCHA pages, tricking users into running malicious commands and stealing sensitive data.
-
Posted: March 25, 2026Views: 50Read moreA phishing campaign uses fake resume files to infect enterprise systems with credential stealers and crypto miners, targeting corporate networks with advanced malware.
-
Read moreMazda confirmed a data breach exposing 692 employee and partner records after attackers exploited vulnerabilities in its warehouse management system.