fp-3b
-
Read moreIn 2024, over 84,000 online gaming accounts were leaked in India, according to Kaspersky. Discover the impact of this data breach and the state of gaming security in the APAC region.
-
Read moreDiscover the critical vulnerability in Cursor IDE, known as 'CurXecute,' that enables remote code execution without user interaction. Learn about the risks and necessary updates.
-
Read moreThe maritime industry faces a surge in ransomware attacks from APT groups, with over 100 cyberattacks reported in the past year. Learn about the tactics used by hackers and the implications for global trade.
-
Read moreToxicPanda, a sophisticated Android banking trojan, has infected over 4,500 devices in Europe, targeting banking apps to steal credentials. Learn about its techniques and impact.
-
Read moreA recent cyberattack on a US chemicals company exploited the SAP NetWeaver vulnerability CVE-2025-31324 to deploy Auto-Color malware. Learn about the attack details and key takeaways.
-
Read moreAeroflot canceled over 40 flights due to a cyberattack claimed by the pro-Ukrainian hacker group Silent Crow. Learn about the impact on operations and the response from Russian authorities.
-
Read moreDiscover the new Gunra ransomware targeting Windows systems, encrypting files, and deleting shadow copies. Learn about its origins, tactics, and how organizations can defend against this emerging threat.
-
Read moreA new malware campaign targets gamers by promoting fake indie games through YouTube and Discord, installing credential-stealing malware. Learn how this sophisticated attack operates and the variants involved.
-
Posted: July 25, 2025Views: 67Read moreA new malware campaign exploits users' trust in financial institutions by using weaponized LNK files disguised as credit card security emails. Learn how this sophisticated attack operates.
-
Read moreThe Coyote banking Trojan, active since February 2024, is the first malware to exploit the Windows UI Automation framework, targeting banks and crypto exchanges in Brazil. Learn how it operates and the risks involved.