fp-1b
-
Posted: August 11, 2025Views: 111Read moreA DRDO employee in Hyderabad has fallen victim to a fake investment scam on WhatsApp, losing ₹54 lakh. Learn how the scam operated and the warning signs.
-
Read moreHackers exploit a legitimate driver to bypass Microsoft Defender and install Akira ransomware. Learn how this vulnerability works and how to protect your PC.
-
Read moreThe GreedyBear cybercriminal operation has stolen over $1 million in a massive cryptocurrency theft campaign using 650+ malicious tools. Learn how they exploit browser extensions and AI.
-
Read moreCybercriminals compromised corporate systems in under five minutes by exploiting QuickAssist and PowerShell scripting. Learn how social engineering facilitated this rapid breach.
-
Read moreA Florida woman was tricked out of ₹12.5 lakh ($15,000) by scammers who cloned her daughter's voice in a deepfake emergency scam. Learn about this rising threat of AI-powered voice fraud.
-
Read moreTwo critical zero-day vulnerabilities in Trend Micro Apex One (on-prem) devices, CVE-2025-54948 and CVE-2025-54987, are being exploited in the wild. Learn about their impact and mitigation strategies.
-
Read moreSecurity researchers demonstrate how Google's Gemini AI bot can be hijacked to control smart home devices using invisible prompts. Learn about the implications for generative AI security.
-
Read moreDiscover critical pre-auth vulnerabilities in Adobe Experience Manager Forms identified by the Searchlight Cyber Research Team. Learn about the risks and recommended actions to secure your deployment.
-
Read moreIn 2024, over 84,000 online gaming accounts were leaked in India, according to Kaspersky. Discover the impact of this data breach and the state of gaming security in the APAC region.
-
Posted: August 05, 2025Views: 76Read moreA Hyderabad housewife lost ₹1.61 crore to cyber scammers posing as employers. Discover how the scam unfolded and the steps taken by police to investigate.