fp-1b
-
The GreedyBear cybercriminal operation has stolen over $1 million in a massive cryptocurrency theft campaign using 650+ malicious tools. Learn how they exploit browser extensions and AI.
-
Cybercriminals compromised corporate systems in under five minutes by exploiting QuickAssist and PowerShell scripting. Learn how social engineering facilitated this rapid breach.
-
A Florida woman was tricked out of ₹12.5 lakh ($15,000) by scammers who cloned her daughter's voice in a deepfake emergency scam. Learn about this rising threat of AI-powered voice fraud.
-
Two critical zero-day vulnerabilities in Trend Micro Apex One (on-prem) devices, CVE-2025-54948 and CVE-2025-54987, are being exploited in the wild. Learn about their impact and mitigation strategies.
-
Security researchers demonstrate how Google's Gemini AI bot can be hijacked to control smart home devices using invisible prompts. Learn about the implications for generative AI security.
-
Discover critical pre-auth vulnerabilities in Adobe Experience Manager Forms identified by the Searchlight Cyber Research Team. Learn about the risks and recommended actions to secure your deployment.
-
In 2024, over 84,000 online gaming accounts were leaked in India, according to Kaspersky. Discover the impact of this data breach and the state of gaming security in the APAC region.
-
Posted: August 05, 2025Views: 24A Hyderabad housewife lost ₹1.61 crore to cyber scammers posing as employers. Discover how the scam unfolded and the steps taken by police to investigate.
-
Discover the critical vulnerability in Cursor IDE, known as 'CurXecute,' that enables remote code execution without user interaction. Learn about the risks and necessary updates.
-
Explore the rising threat of ransomware in India's aviation industry. Learn how digital transformation increases vulnerability and the potential impact on air travel safety and operations.