fp-2c
-
Learn about the incorrect authorization vulnerability in Meta Platforms WhatsApp that allows unauthorized processing of content from arbitrary URLs. Discover mitigation steps and security recommendations.
-
Beware of a new WhatsApp scam where hackers hijack accounts via fake Facebook login links and device linking. Learn how to protect your chats, contacts, and media from takeover.
-
Beware of fake calls from scammers posing as the Data Protection Board of India officials. Learn how to spot these frauds and protect your personal information from social engineering attacks.
-
Posted: August 27, 2025Views: 12Discover how fake loan apps in India are trapping users in harassment and blackmail. Learn about the global network behind these predatory practices and the ongoing regulatory challenges.
-
Zimperium’s zLabs has uncovered a new variant of the Hook Android banking trojan, featuring ransomware-style overlays and advanced credential theft tactics. Learn about its key features and technical insights.
-
Apple has released critical updates to address CVE-2025-43300, a zero-day vulnerability affecting iOS, iPadOS, and macOS. Learn about the impact, affected devices, and how to stay secure.
-
Discover PhantomCard, a sophisticated NFC-based Trojan targeting banking customers in Brazil. Learn how this malware exploits NFC relay attacks to steal sensitive card data and facilitate unauthorized transactions.
-
Learn about the emerging ghost-tapping technique that exploits stolen payment card details linked to Apple Pay and Google Pay. Discover how this method facilitates retail fraud and the impact on users.
-
Discover how cybercriminals are exploiting brokerage accounts in sophisticated ‘ramp and dump’ schemes using mobile phishing tactics. Learn about the risks and how to protect yourself.
-
A new Android phishing campaign is deceiving Indian users by posing as the PM Surya Ghar: Muft Bijli Yojana. Learn how attackers exploit this scheme to install malware and steal sensitive banking information.