Hacktivist Groups Hit India After Pahalgam Attack
First came the bullets, then came the bots. In the wake of India’s April 22 terror attack in Pahalgam and the retaliatory military strikes under…
First came the bullets, then came the bots. In the wake of India’s April 22 terror attack in Pahalgam and the retaliatory military strikes under…
Critical vulnerability in Apache ActiveMQ (CVE-2024-XXXX) exposes brokers to denial-of-service (DoS) attacks by allowing malicious actors to exhaust system memory through specially crafted OpenWire commands.…
A new wave of cyberattacks is targeting Active Directory (AD) environments by abusing Windows Remote Management (WinRM), a legitimate administrative tool, to move laterally and…
QR codes have quietly become a part of everyday business workflows. From authentication to employee onboarding, marketing, and resource sharing, they’re now embedded in countless…
Chrome and Safari are the most popular browser apps, accounting for 90% of the mobile browsers market share, according to Surfshark. They also collect the…
Russia-linked ColdRiver used LostKeys malware in recent attacks Pierluigi Paganini May 09, 2025 Since early 2025, Russia-linked ColdRiver has used LostKeys malware to steal files…
The “extremely creepy” experience of a female online job applicant in India has underscored growing cases of cyber harassment on the labour market despite strong…
Cybersecurity researchers have reported a significant rise in web breaches triggered by a lesser-known technique: Host Header Injection. This sophisticated attack vector has enabled hackers…
In our hyperconnected world, mobile devices are no longer a convenience but central to how businesses operate and communicate. As organizations increasingly embrace mobility and…
Google has released new details on how artificial intelligence (AI) is being used across its platforms to combat a growing wave of online scams. In…
Ubiquity has disclosed two security vulnerabilities affecting its widely used video surveillance platform, UniFi Protect. One of the flaws, now assigned the identifier CVE-2025-23123, has…
Security researchers Nikolai Skliarenko and Yazhi Wang of Trend Micro’s Research Team have disclosed critical details about CVE-2024-44236, a memory corruption vulnerability in Apple’s macOS…