Blogs
-
A sophisticated cyberattack has crippled Uttarakhand's IT infrastructure, rendering over 90 government websites, including the CM helpline, non-functional. This unprecedented breach has halted essential online services and internal operations across the state, with cybersecurity experts working tirelessly to restore the systems.
-
A newly discovered malware, Perfctl, is actively exploiting vulnerable Linux servers to install cryptocurrency miners and proxyjacking software. This stealthy malware hides itself by mimicking legitimate processes, evading detection, and persisting even after system reboots.
-
Cybercriminals have launched a large-scale fraud campaign, using fake trading apps on the Apple App Store and Google Play to defraud victims worldwide. Disguised as legitimate financial applications, these apps lure users into fraudulent investments, resulting in significant financial losses.
-
A new cybersecurity threat, dubbed CosmicSting, is wreaking havoc on Adobe Commerce and Magento stores. Exploiting a critical vulnerability (CVE-2024-34102), attackers are using remote code execution to infiltrate e-commerce platforms, steal sensitive data, and compromise entire systems.
-
Robert Westbrook, a 39-year-old U.K. national, has been charged by the U.S. Department of Justice for allegedly orchestrating a hack-to-trade fraud scheme that netted him approximately $3.75 million in illegal profits by exploiting hacked Microsoft 365 executive emails.
-
Net Protector Total Security has achieved a significant milestone by earning the prestigious AV-Test certification.
-
Cyber fraudsters have devised a new tactic by misusing the 1930 toll-free helpline number, intended for reporting cybercrimes, to deceive unsuspecting individuals. In a recent case reported in Hyderabad, a complainant was duped of ₹29.55 lakh after being coerced into joining a fraudulent video call by criminals posing as law enforcement officials.
-
A dangerous new variant of the RomCom malware, dubbed 'SnipBot', has been spotted in sophisticated data theft attacks. Researchers from Palo Alto Networks' Unit 42 discovered this enhanced version, marking it as RomCom 5.0, and highlighting its ability to steal sensitive data from compromised systems while pivoting on networks to extend the attack.
-
Posted: September 27, 2024Views: 110Microsoft has recently highlighted a significant security threat posed by the threat actor known as Storm-0501, marking a concerning trend in ransomware attacks that extend into hybrid cloud environments.
-
The Cybersecurity and Infrastructure Security Agency (CISA) has issued a warning regarding ongoing cyberattacks on critical infrastructure, particularly targeting Operational Technology (OT) and Industrial Control Systems (ICS). These attacks are being executed using basic methods, such as brute force attacks and exploiting default credentials, impacting vital sectors like water and wastewater systems.
-
Posted: September 25, 2024Views: 104A new version of the Necro Android malware has been discovered hidden in altered versions of popular Android apps, including Wuta Camera and Max Browser, on the Google Play Store. These malicious apps have been downloaded over 11 million times, affecting users worldwide.
-
In a major cybersecurity breach, Star Health Insurance has fallen victim to a massive data leak, compromising the sensitive personal information of over 31 million customers. This stolen data, including medical reports and personal identification details, has been made available through Telegram chatbots.
-
Posted: September 20, 2024Views: 912
In a shocking breach of cybersecurity, the official YouTube channel of the Supreme Court of India was hacked on Friday, displaying videos that promote XRP, a cr
-
Posted: September 19, 2024Views: 785
A new cybersecurity alert reveals that a Chinese state-sponsored botnet, dubbed “Raptor Train,” has compromised more than 260,000 devices, including SOHO routers, IP ca
-
Posted: September 18, 2024Views: 748
Recent cybersecurity reports reveal a troubling trend: ransomware gangs, including BianLian and Rhysida, are increasingly leveraging Microsoft Azure tools—specifically
-
Posted: September 18, 2024Views: 530Cybercriminals are intensifying efforts to breach corporate networks of construction firms by targeting exposed Foundation accounting servers.
-
Posted: September 16, 2024Views: 552
A new malware campaign has been uncovered, which uses a unique tactic to lock users' browsers in kiosk mode, forcing them to enter the
-
Posted: September 13, 2024Views: 534
TrickMo, an advanced Android banking trojan, has resurfaced with new capabilities aimed at exploiting Android's accessibility services to conduct on-device fraud (ODF).
-
Posted: September 13, 2024Views: 523
Fortinet, a global cybersecurity leader, has confirmed a significant data breach following claims by a hacker who alleged the theft of 440GB of files from the company's
-
Posted: September 13, 2024Views: 532
A new strain of Android malware, codenamed Ajina.Banker, has been targeting bank customers across the Central Asia region since November 2023. Discover