Blogs

  1. D-Link DNR-322L Vulnerability: Download of Code Without Integrity Check
  2. Critical Pre-Auth Vulnerabilities in Adobe Experience Manager Forms
  3. Over 84,000 Indian Gaming Accounts Leaked in 2024
  4. Cyber Scammers Trick Woman into Losing ₹1.6 Crores with Fake Job Offer
  5. AI-Powered Code Editor Cursor IDE Vulnerability Allows Remote Code Execution Without User Interaction
  6. With Ransomware on the Rise, India’s Aviation Industry Faces New Security Risks
  7. NVIDIA Triton Bugs Allow Unauthenticated Attackers to Execute Code and Hijack AI Servers
  8. PlayPraetor Android Trojan Infects 11,000+ Devices via Fake Google Play Pages and Meta Ads
  9. Scammed and Shattered: DU Student Dies by Suicide After Losing Savings to Online Fraud
  10. CL-STA-0969 Installs Covert Malware in Telecom Networks During 10-Month Espionage Campaign
  11. Cyber Cold War: China Accuses U.S. of Exploiting Microsoft Flaw to Hack Defense Systems
  12. APT36 Hackers Target Indian Railways and Government Systems with Malicious PDF Files
  13. Bank Fraud: Phishing Scams in WhatsApp Messages
  14. Google Confirms Voice-Based Phishing Breaches of Salesforce Instances
  15. Anubis Ransomware Targets Android and Windows Users: A Growing Threat
  16. APT Hackers Target Maritime Industry with Ransomware Attacks
  17. North Korean APT Hackers Target CI/CD Pipelines to Steal Sensitive Data
  18. Nokia Data Breach: Cybercriminal Claims Access to Internal Network
  19. ToxicPanda Android Banking Malware Infects Over 4,500 Devices in Europe
  20. Hackers Exploit SAP NetWeaver Vulnerability to Deploy Auto-Color Linux Malware
Back to Top