fp-3b
-
Read moreDiscover how artificial intelligence is reshaping phishing tactics in cybercrime. Learn about AI-driven scams, deepfake technology, and the exploitation of messaging platforms.
-
Read moreRoyal Enfield faces a significant ransomware attack, with hackers claiming full system compromise and demanding ransom. Learn about the implications and response.
-
Read moreResearchers unveil the 'Win-DoS Epidemic' at DEF CON 33, revealing new vulnerabilities in Windows that can turn servers and Domain Controllers into DDoS botnets. Learn more about the risks.
-
Read moreA serious flaw in a major automaker's dealer portal allows hackers to unlock and start vehicles remotely. Learn about the vulnerability and its implications.
-
Read moreGoogle's Salesforce instance was compromised by the ShinyHunters group using voice phishing tactics. Learn about the breach and the exposed records.
-
Read moreSocket’s Threat Research Team has uncovered over 60 malicious RubyGems packages that steal social media and marketing credentials. Learn how these infostealer tools operate.
-
Read moreThe GreedyBear cybercriminal operation has stolen over $1 million in a massive cryptocurrency theft campaign using 650+ malicious tools. Learn how they exploit browser extensions and AI.
-
Read moreA Florida woman was tricked out of ₹12.5 lakh ($15,000) by scammers who cloned her daughter's voice in a deepfake emergency scam. Learn about this rising threat of AI-powered voice fraud.
-
Read moreSecurity researchers demonstrate how Google's Gemini AI bot can be hijacked to control smart home devices using invisible prompts. Learn about the implications for generative AI security.
-
Read moreDiscover critical pre-auth vulnerabilities in Adobe Experience Manager Forms identified by the Searchlight Cyber Research Team. Learn about the risks and recommended actions to secure your deployment.