Blogs

  1. CISA Adds Exploited Windows CLFS Privilege Escalation CVE-2021-43226 to KEV: Mandatory Patch by Oct 27, 2025
  2. GitHub Exposes 'Most Powerful FUD Android RAT 2025' with Web C2, Ransomware, and Total AV Evasion
  3. Threat Actor Claims Huawei Source Code Breach and Sells Internal Tools on Dark Web for $1,000
  4. CometJacking: New Attack Hijacks Perplexity’s Comet AI Browser for Covert Data Exfiltration
  5. Apple Patches CVE-2025-43400 Font Parser Flaw in macOS Sequoia 15.7.1 to Prevent Memory Corruption Attacks
  6. SORVEPOTEL: Self-Propagating WhatsApp Malware Targets Brazilian Users with Rapid Phishing Spread
  7. Discord Data Breach: Third-Party Vendor Exposes User Names, Emails, Photo IDs, and Support Data
  8. Notepad++ DLL Hijacking Vulnerability (CVE-2025-56383) Enables Arbitrary Code Execution on User Systems
  9. 2026 FIFA World Cup: Escalating Cyber Threats Demand Cross-Border Security for Largest Tournament Yet
  10. Nimbus Manticore: Iranian APT Targets European Defense and Telecom with MiniJunk Backdoor and DLL Side-Loading Attacks
  11. Threat Actors Exploit Dynamic DNS Providers for Resilient C2 Infrastructure: APT28, APT29, and More
  12. DPDP Act: Employee Data Privacy is India's New Compliance Test
  13. Malicious Postmark-MCP Server Steals Emails via Hidden BCC in AI-Powered Workflows
  14. Evolved XCSSET Malware Targets macOS Developers: Clipboard Hijacking, Firefox Theft, and Xcode Infections
  15. Hackers Weaponize AI-Generated Code to Obfuscate Phishing Payloads in SVG Files, Bypassing Traditional Defenses
  16. Critical SolarWinds Web Help Desk RCE Vulnerability: CVE-2025-26399 Enables Unauthenticated Code Execution
  17. Unveiling AISURU: The 11.5 Tbps Mega Botnet Behind Record-Breaking DDoS Attacks and Totolink Router Compromise
  18. Hackers Exploit Legacy WerFaultSecure.exe to Bypass PPL and Steal LSASS Credentials on Windows 11 24H2
  19. Jaguar Land Rover Cyberattack Halts Production: Tata Motors Shares Plunge 4% Amid ₹21,000 Crore Loss Risk
  20. Cisco IOS Zero-Day CVE-2025-20352: Active SNMP Exploitation Enables RCE and DoS on Network Devices
Back to Top