Blogs
-
Read moreNew research reveals Telegram as the primary tool for 120+ hacktivist groups to plan DDoS strikes via 11,000 posts and hashtags-exposing worldwide targets. Learn to monitor threats, bolster DDoS defenses, and stay ahead of visible cyber tactics.
-
Read more2017 emails reveal IndusInd executives ignored Forex hedging red flags, leading to potential profit manipulation—RBI probes ongoing; experts urge stronger banking audits and governance to safeguard against accounting scandals.
-
Read moreFraudsters in Delhi posed as NCB officials to extract OTPs and siphon ₹20.89 lakh—police arrested 5 linked to 473 cases. Enable 2FA, verify calls, and report to 1930 to avoid digital arrest traps and protect your finances.
-
Posted: October 14, 2025Views: 112Read moreResearcher exposes vulnerability in Worldline Yomani XR's debug port, allowing instant root shell access for malware or network pivots—despite tamper protections. Merchants must patch firmware and audit devices to block this high-risk entry point.
-
Posted: October 14, 2025Comments: 9Views: 6543Read moreNPAV wishes you a safe, secure, and joyous Diwali! As you celebrate the festival of lights, let’s also protect our digital world from the darkness of cyber threats.
-
Posted: October 14, 2025Views: 123Read moreSophos exposes Maverick Menace, a self-spreading Android worm using WhatsApp ZIP lures to disable Defender/UAC, hijack sessions with Selenium, and deploy trojan for bank/crypto theft—hits 400+ environments; verify attachments and use behavioral antivirus to protect.
-
Read moreAttackers use zero-day in Edge's IE Mode Chakra engine to trick users into legacy reloads, enabling RCE and SYSTEM access for malware. Microsoft disabled easy triggers—configure manually via Settings, migrate from IE, and prioritize modern web standards to stay secure.
-
Read moreIT pro in Pune scammed ₹3.66 crore via WhatsApp group and bogus trading app granting remote access—fake profits lured investments. Expert tips: Use official apps, enable 2FA, verify before investing—report to cyber cell to stay safe.
-
Read more"Trinity of Chaos" group (Muddled Libra, Bling Libra, LAPSUS$) steals 1B Salesforce records targeting retail/hospitality; launches DLS October 3, 2025, with FBI seizure October 9. EaaS model enables fraud—implement zero trust and ISAC intel to defend against data theft.
-
Read moreIndian scammers use WhatsApp fake ticket alerts to push RAT-infected mParivahan apps, stealing OTPs, spying via camera, and draining banks. Download from official stores, update OS, use antivirus—report to 1930 if hit to stay safe.
-
Read moreHigh-severity CVE-2025-61884 (CVSS 7.5) in Oracle E-Business Suite's Configurator allows unauthenticated HTTP attacks to access sensitive data (versions 12.2.3-12.2.14). Follows Cl0p-linked CVE-2025-61882 exploits—apply updates, segment networks, and scan for vulnerabilities now.
-
Read moreNew SnakeKeylogger campaign spoofs CPA Global/Clarivate emails with ISO/ZIP lures containing BAT/PowerShell payloads to log keystrokes, hijack clipboard, and exfiltrate data. Persists via "SysUpdate" tasks—train users, sandbox attachments, and monitor PowerShell for defense.
-
Read moreFortiGuard Labs exposes Chaos ransomware's aggressive C++ upgrade—selective encryption, large file deletion, and Bitcoin wallet swapping via clipboard hijack. This RaaS threat from ex-BlackSuit actors targets big-game hunting; bolster backups and detection to counter faster, multifaceted attacks.
-
Read moreSophisticated phishing uses legit-looking Zoom Docs invites from "HR" to lure job hunters into fake Gmail login pages, exfiltrating credentials in real-time via WebSocket on overflow.qyrix.com.de. Discovered by Himanshu Anand—verify emails directly and use password managers to avoid account takeovers.
-
Read morePublic Wi-Fi exposes you to MitM attacks and data theft—learn to spot evil twin hotspots, use VPNs for encryption, enable 2FA, and stick to cellular for sensitive tasks to protect against rising breaches in cafes and airports.
-
Posted: October 10, 2025Views: 179Read moreZimperium exposes ClayRat spyware infecting Russian Android users via phishing sites and Telegram lures mimicking WhatsApp/TikTok—exfiltrates SMS, calls, photos; auto-sends to contacts. 600 samples detected; related African phone study reveals pre-installed app risks—update and scan devices now.
-
Read moreCritical command injection flaw in Figma's MCP server (CVSS 7.5) allows RCE via unsanitized inputs in curl fallback; patched in v0.6.3. Imperva warns of risks in AI dev tools like Cursor—avoid exec with untrusted data amid rising LLM threats like Gemini's ASCII smuggling.
-
Read moreVampire Bot spyware targets job seekers via deceptive ZIP attachments in recruiter emails, stealing screenshots and data. Linked to BatShadow hackers, it evades detection—stay safe by verifying offers and using EDR tools to avoid digital traps.
-
Read moreUnspecified flaw in Oracle E-Business Suite's BI Publisher Integration allows unauthenticated HTTP attacks to hijack Concurrent Processing, exploited in ransomware campaigns. Apply patches, follow BOD 22-01 guidance, or discontinue use to protect enterprise operations from data encryption and downtime.