fp-3a
-
Read moreThe GreedyBear cybercriminal operation has stolen over $1 million in a massive cryptocurrency theft campaign using 650+ malicious tools. Learn how they exploit browser extensions and AI.
-
Read moreSecurity researchers demonstrate how Google's Gemini AI bot can be hijacked to control smart home devices using invisible prompts. Learn about the implications for generative AI security.
-
Read moreDiscover critical pre-auth vulnerabilities in Adobe Experience Manager Forms identified by the Searchlight Cyber Research Team. Learn about the risks and recommended actions to secure your deployment.
-
Read moreIn 2024, over 84,000 online gaming accounts were leaked in India, according to Kaspersky. Discover the impact of this data breach and the state of gaming security in the APAC region.
-
Read moreDiscover the critical vulnerability in Cursor IDE, known as 'CurXecute,' that enables remote code execution without user interaction. Learn about the risks and necessary updates.
-
Read moreDiscover how the state-sponsored threat actor CL-STA-0969 targeted Southeast Asian telecom networks, deploying covert malware for remote access. Learn about their tactics and tools.
-
Read moreDiscover how the Pakistan-linked APT36 group is targeting Indian railways and government systems using malicious PDF files. Learn about their sophisticated infection chains and phishing tactics.
-
Read moreDiscover how phishing scams are targeting users through WhatsApp messages, including a recent HDFC Bank impersonation attempt. Learn how to protect yourself with FraudProtector.Net.
-
Read moreThe maritime industry faces a surge in ransomware attacks from APT groups, with over 100 cyberattacks reported in the past year. Learn about the tactics used by hackers and the implications for global trade.
-
Read moreToxicPanda, a sophisticated Android banking trojan, has infected over 4,500 devices in Europe, targeting banking apps to steal credentials. Learn about its techniques and impact.