Blogs

  1. Zscaler Salesforce Breach 2025: UNC6395 Exploits OAuth Tokens in Largest SaaS Attack
  2. Cybersecurity Alert: 8 Malicious NPM Packages Target Windows Chrome Users
  3. Sangoma FreePBX Authentication Bypass Vulnerability Risks Remote Code Execution
  4. Sindoor Dropper Malware Targets Linux Systems Using Weaponized .desktop Files
  5. AI-Generated Ransomware Evades Antivirus Detection: New Cybersecurity Threat in 2025
  6. TamperedChef Malware Disguised as AppSuite PDF Editor Steals Sensitive Data
  7. PromptLock: The First AI-Powered Ransomware Discovered Using OpenAI's gpt-oss:20b Model
  8. Underground Ransomware Gang: Evolving Tactics Threaten Global Organizations in 2024
  9. Salesloft OAuth Breach: How Hackers Exposed Salesforce Customer Data via Drift AI Chat Agent
  10. Fake Loan Apps Resurface in India: Global Network Under Investigation
  11. Malicious Go Module Poses as SSH Brute-Force Tool: Credential Theft via Telegram Bot
  12. New Hook Android Banking Malware: Advanced Features and Threat Insights
  13. AI Website Generators Exploited for Malware Campaigns: A Growing Threat
  14. Auchan Cyberattack: Customer Data Compromised in Major Breach
  15. Coordinated Scanning Campaign Targets Microsoft RDP Services: Over 30,000 IPs Involved
  16. Citrix Session Recording Vulnerabilities: Key Risks and Mitigation Strategies
  17. ChatGPT-5 Downgrade Attack: How Hackers Evade AI Defenses with Simple Prompts
  18. AI vs Fraud: RBI and NPCI Enhance Cyber Scam Defenses in India
  19. Happy Birthday Linux: Celebrating 34 Years of Open-Source Innovation
  20. New Policy for Secure Sharing of Transport Data in India: Key Highlights
Back to Top