Blogs

  1. CometJacking: New Attack Hijacks Perplexity’s Comet AI Browser for Covert Data Exfiltration
  2. Apple Patches CVE-2025-43400 Font Parser Flaw in macOS Sequoia 15.7.1 to Prevent Memory Corruption Attacks
  3. SORVEPOTEL: Self-Propagating WhatsApp Malware Targets Brazilian Users with Rapid Phishing Spread
  4. Discord Data Breach: Third-Party Vendor Exposes User Names, Emails, Photo IDs, and Support Data
  5. Notepad++ DLL Hijacking Vulnerability (CVE-2025-56383) Enables Arbitrary Code Execution on User Systems
  6. 2026 FIFA World Cup: Escalating Cyber Threats Demand Cross-Border Security for Largest Tournament Yet
  7. Nimbus Manticore: Iranian APT Targets European Defense and Telecom with MiniJunk Backdoor and DLL Side-Loading Attacks
  8. Threat Actors Exploit Dynamic DNS Providers for Resilient C2 Infrastructure: APT28, APT29, and More
  9. DPDP Act: Employee Data Privacy is India's New Compliance Test
  10. Malicious Postmark-MCP Server Steals Emails via Hidden BCC in AI-Powered Workflows
  11. Evolved XCSSET Malware Targets macOS Developers: Clipboard Hijacking, Firefox Theft, and Xcode Infections
  12. Hackers Weaponize AI-Generated Code to Obfuscate Phishing Payloads in SVG Files, Bypassing Traditional Defenses
  13. Critical SolarWinds Web Help Desk RCE Vulnerability: CVE-2025-26399 Enables Unauthenticated Code Execution
  14. Unveiling AISURU: The 11.5 Tbps Mega Botnet Behind Record-Breaking DDoS Attacks and Totolink Router Compromise
  15. Hackers Exploit Legacy WerFaultSecure.exe to Bypass PPL and Steal LSASS Credentials on Windows 11 24H2
  16. Jaguar Land Rover Cyberattack Halts Production: Tata Motors Shares Plunge 4% Amid ₹21,000 Crore Loss Risk
  17. Cisco IOS Zero-Day CVE-2025-20352: Active SNMP Exploitation Enables RCE and DoS on Network Devices
  18. India's Education Sector Faces 7,000+ Cyberattacks Weekly: Hybrid Learning Vulnerabilities Exposed
  19. Over 150 Firebase-Powered Mobile Apps Expose Sensitive User Data via Misconfigurations
  20. Hackers Bypass EDR with In-Memory PE Loader: Fileless Execution in Trusted Processes
Back to Top