fp-3b
-
Security researchers demonstrate how Google's Gemini AI bot can be hijacked to control smart home devices using invisible prompts. Learn about the implications for generative AI security.
-
Discover critical pre-auth vulnerabilities in Adobe Experience Manager Forms identified by the Searchlight Cyber Research Team. Learn about the risks and recommended actions to secure your deployment.
-
In 2024, over 84,000 online gaming accounts were leaked in India, according to Kaspersky. Discover the impact of this data breach and the state of gaming security in the APAC region.
-
Discover the critical vulnerability in Cursor IDE, known as 'CurXecute,' that enables remote code execution without user interaction. Learn about the risks and necessary updates.
-
The maritime industry faces a surge in ransomware attacks from APT groups, with over 100 cyberattacks reported in the past year. Learn about the tactics used by hackers and the implications for global trade.
-
ToxicPanda, a sophisticated Android banking trojan, has infected over 4,500 devices in Europe, targeting banking apps to steal credentials. Learn about its techniques and impact.
-
A recent cyberattack on a US chemicals company exploited the SAP NetWeaver vulnerability CVE-2025-31324 to deploy Auto-Color malware. Learn about the attack details and key takeaways.
-
Aeroflot canceled over 40 flights due to a cyberattack claimed by the pro-Ukrainian hacker group Silent Crow. Learn about the impact on operations and the response from Russian authorities.
-
Discover the new Gunra ransomware targeting Windows systems, encrypting files, and deleting shadow copies. Learn about its origins, tactics, and how organizations can defend against this emerging threat.
-
A new malware campaign targets gamers by promoting fake indie games through YouTube and Discord, installing credential-stealing malware. Learn how this sophisticated attack operates and the variants involved.