fp-3a
-
Socket’s Threat Research Team has uncovered over 60 malicious RubyGems packages that steal social media and marketing credentials. Learn how these infostealer tools operate.
-
The GreedyBear cybercriminal operation has stolen over $1 million in a massive cryptocurrency theft campaign using 650+ malicious tools. Learn how they exploit browser extensions and AI.
-
Security researchers demonstrate how Google's Gemini AI bot can be hijacked to control smart home devices using invisible prompts. Learn about the implications for generative AI security.
-
Discover critical pre-auth vulnerabilities in Adobe Experience Manager Forms identified by the Searchlight Cyber Research Team. Learn about the risks and recommended actions to secure your deployment.
-
In 2024, over 84,000 online gaming accounts were leaked in India, according to Kaspersky. Discover the impact of this data breach and the state of gaming security in the APAC region.
-
Discover the critical vulnerability in Cursor IDE, known as 'CurXecute,' that enables remote code execution without user interaction. Learn about the risks and necessary updates.
-
Discover how the state-sponsored threat actor CL-STA-0969 targeted Southeast Asian telecom networks, deploying covert malware for remote access. Learn about their tactics and tools.
-
Discover how the Pakistan-linked APT36 group is targeting Indian railways and government systems using malicious PDF files. Learn about their sophisticated infection chains and phishing tactics.
-
Discover how phishing scams are targeting users through WhatsApp messages, including a recent HDFC Bank impersonation attempt. Learn how to protect yourself with FraudProtector.Net.
-
The maritime industry faces a surge in ransomware attacks from APT groups, with over 100 cyberattacks reported in the past year. Learn about the tactics used by hackers and the implications for global trade.