Blogs
-
A Florida woman was tricked out of ₹12.5 lakh ($15,000) by scammers who cloned her daughter's voice in a deepfake emergency scam. Learn about this rising threat of AI-powered voice fraud.
-
Two critical zero-day vulnerabilities in Trend Micro Apex One (on-prem) devices, CVE-2025-54948 and CVE-2025-54987, are being exploited in the wild. Learn about their impact and mitigation strategies.
-
Cybercriminals are using free trials of Endpoint Detection and Response (EDR) software to disable existing security measures. Learn about the BYOEDR attack technique and its implications.
-
A 32-year-old software engineer from Bengaluru was defrauded of ₹55.64 lakh by a cybercriminal posing as a prospective bride on a matrimonial portal. Learn how the scam unfolded.
-
Security researchers demonstrate how Google's Gemini AI bot can be hijacked to control smart home devices using invisible prompts. Learn about the implications for generative AI security.
-
Learn about the critical vulnerability in D-Link DNR-322L that allows code downloads without integrity checks. Discover recommended actions to secure your device.
-
Discover critical pre-auth vulnerabilities in Adobe Experience Manager Forms identified by the Searchlight Cyber Research Team. Learn about the risks and recommended actions to secure your deployment.
-
In 2024, over 84,000 online gaming accounts were leaked in India, according to Kaspersky. Discover the impact of this data breach and the state of gaming security in the APAC region.
-
Posted: August 05, 2025Views: 26A Hyderabad housewife lost ₹1.61 crore to cyber scammers posing as employers. Discover how the scam unfolded and the steps taken by police to investigate.
-
Discover the critical vulnerability in Cursor IDE, known as 'CurXecute,' that enables remote code execution without user interaction. Learn about the risks and necessary updates.
-
Explore the rising threat of ransomware in India's aviation industry. Learn how digital transformation increases vulnerability and the potential impact on air travel safety and operations.
-
Discover critical vulnerabilities in NVIDIA's Triton Inference Server that allow unauthenticated attackers to execute code and take control of AI servers. Learn about the risks and necessary updates."
-
Discover how the PlayPraetor Android Trojan has infected over 11,000 devices through fake Google Play pages and Meta Ads. Learn about its functionalities and impact on users.
-
A tragic story of a Delhi University student who died by suicide after losing ₹94,000 to an online scam. Explore the implications of cyber fraud and the need for digital literacy.
-
Discover how the state-sponsored threat actor CL-STA-0969 targeted Southeast Asian telecom networks, deploying covert malware for remote access. Learn about their tactics and tools.
-
China accuses the U.S. of cyberattacks on its defense infrastructure by exploiting a Microsoft vulnerability. Explore the implications of this escalating cyber cold war.
-
Discover how the Pakistan-linked APT36 group is targeting Indian railways and government systems using malicious PDF files. Learn about their sophisticated infection chains and phishing tactics.
-
Discover how phishing scams are targeting users through WhatsApp messages, including a recent HDFC Bank impersonation attempt. Learn how to protect yourself with FraudProtector.Net.
-
A series of data breaches linked to the ShinyHunters group has affected major companies like Qantas and LVMH. Learn how voice phishing techniques compromised Salesforce CRM systems and the implications for data security.
-
Anubis ransomware, first detected in November 2024, targets both Android and Windows platforms, utilizing a ransomware-as-a-service model. Learn about its tactics, high-profile attacks, and how to defend against this emerging threat.