fp-1a
-
Security researchers demonstrate how Google's Gemini AI bot can be hijacked to control smart home devices using invisible prompts. Learn about the implications for generative AI security.
-
Discover critical pre-auth vulnerabilities in Adobe Experience Manager Forms identified by the Searchlight Cyber Research Team. Learn about the risks and recommended actions to secure your deployment.
-
In 2024, over 84,000 online gaming accounts were leaked in India, according to Kaspersky. Discover the impact of this data breach and the state of gaming security in the APAC region.
-
Posted: August 05, 2025Views: 24A Hyderabad housewife lost ₹1.61 crore to cyber scammers posing as employers. Discover how the scam unfolded and the steps taken by police to investigate.
-
Discover the critical vulnerability in Cursor IDE, known as 'CurXecute,' that enables remote code execution without user interaction. Learn about the risks and necessary updates.
-
Explore the rising threat of ransomware in India's aviation industry. Learn how digital transformation increases vulnerability and the potential impact on air travel safety and operations.
-
Discover how the PlayPraetor Android Trojan has infected over 11,000 devices through fake Google Play pages and Meta Ads. Learn about its functionalities and impact on users.
-
A tragic story of a Delhi University student who died by suicide after losing ₹94,000 to an online scam. Explore the implications of cyber fraud and the need for digital literacy.
-
Discover how the state-sponsored threat actor CL-STA-0969 targeted Southeast Asian telecom networks, deploying covert malware for remote access. Learn about their tactics and tools.
-
China accuses the U.S. of cyberattacks on its defense infrastructure by exploiting a Microsoft vulnerability. Explore the implications of this escalating cyber cold war.