Blogs
-
A newly registered threat actor claims unauthorized access to the backend panel and customer database of Netmeds, potentially exposing sensitive data of 6.4 million users. Learn more about the implications and assessment of this alleged breach.
-
A sophisticated cyber espionage campaign, dubbed "LapDogs," has compromised over 1,000 SOHO devices worldwide using a custom backdoor. Discover the tactics and implications of this covert operation linked to China.
-
Uttarakhand STF arrests the mastermind behind a ₹3.20 crore cyber fraud, using fake identities and banking credentials to deceive victims. Learn more about the operation and its implications.
-
A critical privilege escalation vulnerability in Notepad++ version 8.8.1 exposes millions of users to system compromise. Learn about the flaw, its implications, and the urgent need for updates.
-
A major cybersecurity breach at Agarwal Packers and Movers has compromised sensitive data of high-profile clients, including government officials. An FIR has been filed as concerns grow over national security implications.
-
Discover how the Confucius hacking group is targeting government and military entities with their advanced wooperstealer malware. Learn about their sophisticated techniques and the challenges they pose to cybersecurity.
-
Discover the SparkKitty spyware campaign targeting iOS and Android devices through official app stores. Learn about its sophisticated techniques, objectives, and the risks it poses to mobile users.
-
The NCSC has issued a warning about the UMBRELLA STAND malware targeting Fortinet FortiGate firewalls. Learn about its sophisticated techniques, persistence mechanisms, and the risks it poses to network infrastructure.
-
The Prometei botnet has resurfaced, targeting Linux servers for cryptocurrency mining and credential theft. Discover the sophisticated techniques used in this malware operation and how it poses a threat to enterprise infrastructure.
-
A newlywed couple in Pune lost ₹1.6 lakh to a fake courier scam shortly after their wedding. Learn how social engineering tactics are used in phishing schemes and how to protect yourself.
-
A new phishing campaign targeting employees uses fake TxTag toll payment notices and government domain spoofing to steal personal and financial information. Learn how to recognize and avoid this sophisticated scam.
-
Posted: June 20, 2025Views: 7The GodFather banking malware has evolved, utilizing on-device virtualization to hijack legitimate banking and cryptocurrency apps. Discover how this advanced threat operates and its implications for mobile security.
-
The FBI warns iPhone and Android users about a surge in DMV text scams, urging immediate deletion of suspicious messages. Learn how to protect yourself from these rising cyber threats.
-
Tesla's Wall Connector was hacked in an 18-minute attack during the Pwn2Own Automotive competition, exposing vulnerabilities in the charging port. Learn about the implications and security measures taken.
-
A massive leak of 16 billion passwords from major platforms like Apple, Facebook, and Google has been uncovered. Learn how to protect your accounts and why switching to passkeys is essential.
-
Posted: June 19, 2025Views: 7A new malware strain called SuperCard exploits hacked Android phones to steal payment card data during contactless transactions. Learn about its infection mechanism and the growing threat to mobile payment security.
-
Posted: June 19, 2025Views: 10Israel-linked hackers, Gonjeshke Darande, breach Iran's largest crypto exchange, Nobitex, leaking sensitive data and allegedly siphoning $90 million. Explore the implications for users and the digital economy.
-
North Korean hackers from the Famous Chollima group have launched a new Python-based RAT, PylangGhost, targeting Windows and macOS users in the cryptocurrency sector. Learn about the attack methods and implications.
-
Security researcher Sergei Volokitin exposes vulnerabilities in Xiaomi devices, including the S3 smartwatch, at the Hard Pwn conference. Learn about the risks and the importance of hardware security.
-
A recent fake KYC scam in Delhi has led to a victim losing ₹8 lakh. Learn how these scams operate, warning signs to watch for, and protective measures to safeguard your finances.