Blogs
-
A father-son duo has been implicated in a ₹64 lakh cyber fraud involving UPI transfers from a State Bank of India account at the Indore district court. Discover the details of this shocking breach.
-
A serious vulnerability in IBM Backup, Recovery, and Media Services (CVE-2025-33108) could allow attackers to escalate privileges and execute malicious code. Learn about the risks and mitigation steps.
-
A woman from West Bengal has been arrested for her role in a ₹74.10 lakh investment fraud in Odisha. Learn about the scam's details and the rising trend of cybercrime targeting investors.
-
A new malware campaign exploits Discord's invite system to deliver AsyncRAT and Skuld Stealer, targeting crypto wallets. Learn how attackers hijack links and the risks involved.
-
A significant security vulnerability (CVE-2025-6029) in KIA Ecuador's keyless entry systems exposes thousands of vehicles to theft. Learn about the risks, attack methods, and recommendations for consumers.
-
Posted: June 13, 2025Views: 20A major cyber fraud racket involving ₹2,050 crore has been uncovered in Surat, with over 160 fake bank accounts linked to an international network. Discover how the scam operated and the ongoing investigation.
-
OSR Ayurvedics, a Hyderabad-based skincare company, has fallen victim to a ₹12.7 crore cyber scam involving fake Google ads. Discover how cybercriminals exploited the brand and the implications for digital marketing.
-
Posted: June 13, 2025Views: 11A 29-year-old man in Mumbai, Tauheed Khan, died by suicide after losing money in an investment fraud and a cyber scam. Discover the tragic details of his story and the ongoing investigation.
-
Angad Pal Singh, a key suspect in a ₹30 crore export fraud case involving ICICI Bank, has been arrested after 8 years in hiding. Discover the details of the scam and ongoing investigations.
-
Discover how the VexTrio scam network exploits WordPress sites to distribute malware and fraudulent schemes. Learn about the tactics used and the impact on global cybersecurity.
-
Posted: June 12, 2025Categories: Bank Phishing, Data Breach, Hacking, Hacker, Banking Trojan, Financial fraud, Fraud ProtectorViews: 11The investigation into the ₹11.55 crore cyber fraud at Himachal Pradesh State Cooperative Bank has led to multiple arrests. Learn about the hacking incident, ongoing investigations, and cybersecurity measures.
-
GreyNoise warns of coordinated brute-force attacks on Apache Tomcat Manager interfaces, involving 295 malicious IPs. Learn about the risks and recommended security measures.
-
The Indian government has issued a high-severity alert regarding vulnerabilities in devices using MediaTek processors. Learn about affected devices, security risks, and recommended actions.
-
A critical vulnerability in Windows Remote Desktop Services (CVE-2025-32710) enables unauthorized remote code execution. Learn about affected systems, security updates, and mitigation strategies.
-
Adobe has issued a security update addressing 254 vulnerabilities, primarily affecting Adobe Experience Manager. Learn about the critical flaws and how to protect your software.
-
A new malware campaign disguised as an Instagram growth tool is stealing login credentials. Learn how "imad213" works and how to protect your account.
-
Posted: June 11, 2025Views: 16FIN6 cybercrime group uses fake resumes hosted on AWS to deliver More_eggs malware via LinkedIn. Learn how they target recruiters and evade detection.
-
Posted: June 10, 2025Views: 21Discover how a China-linked cyber espionage group, including APT15 and UNC5174, targeted over 70 organizations across government, media, and other sectors. Learn about the malware used, including ShadowPad and GoReShell, and the exploited vulnerabilities.
-
Posted: June 10, 2025Views: 10Learn about the ransomware attack on Sensata Technologies, a leading industrial tech firm. Discover how the breach impacted operations, compromised customer data, and the company's response, including credit monitoring for affected individuals.
-
Posted: June 10, 2025Views: 12Learn about a critical vulnerability in Google's account recovery system that allowed attackers to access any user's phone number through a brute-force attack, highlighting the importance of security audits for legacy systems.