Blogs
-
Read moreRoyal Enfield faces a significant ransomware attack, with hackers claiming full system compromise and demanding ransom. Learn about the implications and response.
-
Read moreResearchers unveil the 'Win-DoS Epidemic' at DEF CON 33, revealing new vulnerabilities in Windows that can turn servers and Domain Controllers into DDoS botnets. Learn more about the risks.
-
-
Read moreA serious flaw in a major automaker's dealer portal allows hackers to unlock and start vehicles remotely. Learn about the vulnerability and its implications.
-
Posted: August 11, 2025Views: 51Read moreA DRDO employee in Hyderabad has fallen victim to a fake investment scam on WhatsApp, losing ₹54 lakh. Learn how the scam operated and the warning signs.
-
Read moreGoogle's Salesforce instance was compromised by the ShinyHunters group using voice phishing tactics. Learn about the breach and the exposed records.
-
Read moreHackers exploit a legitimate driver to bypass Microsoft Defender and install Akira ransomware. Learn how this vulnerability works and how to protect your PC.
-
Read moreSocket’s Threat Research Team has uncovered over 60 malicious RubyGems packages that steal social media and marketing credentials. Learn how these infostealer tools operate.
-
Read moreThe GreedyBear cybercriminal operation has stolen over $1 million in a massive cryptocurrency theft campaign using 650+ malicious tools. Learn how they exploit browser extensions and AI.
-
Read moreCybercriminals compromised corporate systems in under five minutes by exploiting QuickAssist and PowerShell scripting. Learn how social engineering facilitated this rapid breach.
-
Read moreA Florida woman was tricked out of ₹12.5 lakh ($15,000) by scammers who cloned her daughter's voice in a deepfake emergency scam. Learn about this rising threat of AI-powered voice fraud.
-
Read moreTwo critical zero-day vulnerabilities in Trend Micro Apex One (on-prem) devices, CVE-2025-54948 and CVE-2025-54987, are being exploited in the wild. Learn about their impact and mitigation strategies.
-
Read moreCybercriminals are using free trials of Endpoint Detection and Response (EDR) software to disable existing security measures. Learn about the BYOEDR attack technique and its implications.
-
Read moreA 32-year-old software engineer from Bengaluru was defrauded of ₹55.64 lakh by a cybercriminal posing as a prospective bride on a matrimonial portal. Learn how the scam unfolded.
-
Read moreSecurity researchers demonstrate how Google's Gemini AI bot can be hijacked to control smart home devices using invisible prompts. Learn about the implications for generative AI security.
-
Read moreLearn about the critical vulnerability in D-Link DNR-322L that allows code downloads without integrity checks. Discover recommended actions to secure your device.
-
Read moreDiscover critical pre-auth vulnerabilities in Adobe Experience Manager Forms identified by the Searchlight Cyber Research Team. Learn about the risks and recommended actions to secure your deployment.
-
Read moreIn 2024, over 84,000 online gaming accounts were leaked in India, according to Kaspersky. Discover the impact of this data breach and the state of gaming security in the APAC region.
-
Posted: August 05, 2025Views: 28Read moreA Hyderabad housewife lost ₹1.61 crore to cyber scammers posing as employers. Discover how the scam unfolded and the steps taken by police to investigate.
-
Read moreDiscover the critical vulnerability in Cursor IDE, known as 'CurXecute,' that enables remote code execution without user interaction. Learn about the risks and necessary updates.