Security

Cybercriminals Exploit Link Wrapping to Launch Stealthy Phishing Attacks and Steal Sensitive User Information

Cybercriminals Exploit Link Wrapping to Launch Stealthy...

Cybercriminals are exploiting trusted tools like "link wrapping" in new phishing...

Govt boosts Cybercrime Fight with Digital Intelligence Platform and AI-Backed Fraud Detection Tools

Govt boosts Cybercrime Fight with Digital Intelligence ...

The government is strengthening cyber fraud prevention through digital platforms...

Tea App Hit by Cyberattack, Over 70,000 User Images Compromised Including Verification Selfies

Tea App Hit by Cyberattack, Over 70,000 User Images Com...

Tea, a women-focused dating review app, suffered a data breach exposing 72,000 i...

Fraudulent PAN 2.0 Emails Pose Security Threat, Government Urges Citizens to Stay Cautious Online

Fraudulent PAN 2.0 Emails Pose Security Threat, Governm...

The Government of India warns against a fake “PAN 2.0” email scam aiming to stea...

Clorox Blames IT Provider for Security Failures After $380M Ransomware Attack Disrupts Operations

Clorox Blames IT Provider for Security Failures After $...

Clorox has filed a lawsuit against IT provider Cognizant after a ransomware atta...

New AI-Driven Malware Uses Language Models to Generate Commands and Steal Documents from Infected Systems

New AI-Driven Malware Uses Language Models to Generate ...

Ukraine's CERT-UA uncovered LAMEHUG, a new AI-powered malware used in phishing a...

Microsoft Warns of Chinese Hackers Exploiting SharePoint Worldwide, Urges Urgent Security Patching

Microsoft Warns of Chinese Hackers Exploiting SharePoin...

Microsoft blamed recent cyberattacks on SharePoint servers to Chinese state-spon...

158-Year-Old UK Logistics Firm Shuts Down After Ransomware Attack, Highlighting Password Vulnerability Risks

158-Year-Old UK Logistics Firm Shuts Down After Ransomw...

A ransomware attack damaged 158-year-old KNP Logistics, causing total data loss ...

MFA Is No Longer Enough: The Shift Toward Passwordless, Adaptive, and Phishing-Resistant Authentication

MFA Is No Longer Enough: The Shift Toward Passwordless,...

Traditional MFA is no longer enough. Future-ready authentication must be passwor...

Govt Pushes for Cybersecurity Readiness in Smart Cities with Dedicated CISOs and Control Centres

Govt Pushes for Cybersecurity Readiness in Smart Cities...

Union Home Secretary emphasized appointing CISOs in every city to strengthen cyb...

Critical Server Flaw Under Attack: Microsoft Urges Immediate Patching to Stop Ongoing Exploits

Critical Server Flaw Under Attack: Microsoft Urges Imme...

Microsoft warns of active cyberattacks exploiting a zero-day flaw in on-premises...

A New Cyber Threat Spreads Without Internet—Even Offline Systems Are No Longer Safe

A New Cyber Threat Spreads Without Internet—Even Offlin...

A new offline ransomware threat is targeting systems via USB drives, encrypting ...

Modern Scams Use Real Info and OTPs to Trick You — Here's How to Stay Safe from Financial Fraud

Modern Scams Use Real Info and OTPs to Trick You — Here...

Scammers are using stolen data and fake bank calls to trick people into sharing ...

Hidden Threats in eSIM Technology: Researchers Warn of Spying, Cloning, and Permanent Damage Risks

Hidden Threats in eSIM Technology: Researchers Warn of ...

Researchers have uncovered serious vulnerabilities in eSIM technology that could...

Hidden Text in Emails Can Manipulate Gmail’s Gemini AI, Raising New Cybersecurity Concerns

Hidden Text in Emails Can Manipulate Gmail’s Gemini AI,...

A researcher found that Gmail's Gemini AI can be tricked through hidden prompt i...

McDonald’s Data Breach Exposes 60 Million Job Applicants Through AI Chatbot Vulnerability in Hiring Platform

McDonald’s Data Breach Exposes 60 Million Job Applicant...

McDonald’s hiring portal suffered a data breach exposing over 60 million applica...