Blogs

  1. Rajya Sabha MP Sudha Murty Targeted in Cyber Fraud: Fake Telecom Call Threatens Digital Misuse, FIR Filed
  2. Iranian APT Nimbus Manticore Uses Fake Job Offers to Deploy Advanced Malware on European Critical Infrastructure
  3. Threat Actors Exploit Oracle Database Scheduler for Stealthy Ransomware Attacks on Corporate Networks
  4. Kawa4096 Ransomware Targets Multinational Corporations with Double Extortion and Data Leaks
  5. MalTerminal: Pioneering GPT-4-Powered Malware That Generates Ransomware and Reverse Shells on Demand
  6. EDR-Freeze: New Tool Exploits Windows Function to Suspend EDR and Antivirus in 'Coma' State
  7. Rise of AI-Generated Fake CAPTCHAs: Cybercriminals' New Tool for Sophisticated Phishing Attacks
  8. New Phishing Campaign Targets Facebook Users Using Redirected Fake Login Pages
  9. KrasAvia Cyberattack Disrupts Website and Flight Operations, Forcing Manual Procedures
  10. Everest Ransomware Group Claims Major Data Breach at BMW, Threatens to Leak Sensitive Files
  11. Zero-Click Vulnerability in ChatGPT’s Deep Research Agent Exposes Gmail Data
  12. Insight Partners Confirms Data Breach Exposing Personal Information After Months-Long Intrusion
  13. Pixie Dust Wi-Fi Attack Exploits WPS Flaw to Steal Router PIN and Access Networks
  14. Founder of BreachForums Sentenced to Three Years for Running Major Cybercrime Marketplace
  15. AI: The New Weapon Against Financial Crime Uncovered in Minutes
  16. RevengeHotels Uses AI-Generated Scripts to Deploy VenomRAT Malware on Windows
  17. Hyderabad Cyber Crime Police Arrest 61 Across 14 States, Recover Over ₹1 Crore in Online Fraud Crackdown
  18. Critical LG WebOS TV Vulnerability Allows Authentication Bypass and Full Device Takeover
  19. Nagpur Family Dupes Nanded Businessman of ₹1.5 Crore: Four Booked for Fraud
  20. Spring Framework and Security Vulnerabilities Allow Authorization Bypass in Generic Types
Back to Top