Blogs

  1. ClayRat Android Spyware Targets Russia with Fake WhatsApp and TikTok Apps for Data Theft and Auto-Spread
  2. Figma MCP Vulnerability CVE-2025-53967 Enables Remote Code Execution—Update to v0.6.3 Now
  3. Job Hunters Alert: Vampire Bot Malware Hides in Fake Job Offer Emails
  4. Critical Oracle E-Business Suite Vulnerability Enables Ransomware Takeover of Concurrent Processing
  5. Google's CodeMender AI: Detects Vulnerabilities and Auto-Rewrites Code for Bulletproof Patches
  6. Hackers Weaponize AI Chatbots to Steal Sensitive Data and Breach Infrastructure
  7. OpenAI Bans ChatGPT Accounts of Chinese Hackers Using AI for Malware Refinement and Phishing Attacks
  8. Hackers Silently Weaponize WordPress Sites with Malicious PHP Injections for Malvertising and Redirects
  9. Palo Alto PAN-OS GlobalProtect Portals Under Siege: 2,200+ IPs Surge in Brute-Force Reconnaissance Attacks
  10. Microsoft Warns: Hackers Exploit Teams Features Across Attack Chain for Malware and Ransomware Delivery
  11. Gujarat Faces 38 Lakh Malware Attacks Surge: Essential Tips to Secure Your Devices
  12. Jammu Cyber Police Busts ₹4.44 Crore "Digital Arrest" Scam: Three Arrested from Surat in Businessman Extortion Case
  13. OpenSSH CVE-2025-61984 Command Injection RCE via ProxyCommand Newline Bypass in Git Submodules Patch to 10.1 Now
  14. CISA Adds Exploited Windows CLFS Privilege Escalation CVE-2021-43226 to KEV: Mandatory Patch by Oct 27, 2025
  15. GitHub Exposes 'Most Powerful FUD Android RAT 2025' with Web C2, Ransomware, and Total AV Evasion
  16. Threat Actor Claims Huawei Source Code Breach and Sells Internal Tools on Dark Web for $1,000
  17. CometJacking: New Attack Hijacks Perplexity’s Comet AI Browser for Covert Data Exfiltration
  18. Apple Patches CVE-2025-43400 Font Parser Flaw in macOS Sequoia 15.7.1 to Prevent Memory Corruption Attacks
  19. SORVEPOTEL: Self-Propagating WhatsApp Malware Targets Brazilian Users with Rapid Phishing Spread
  20. Discord Data Breach: Third-Party Vendor Exposes User Names, Emails, Photo IDs, and Support Data
Back to Top