India Dismantles ‘Phishing SMS Factory’ Infrastructure
India’s Central Bureau of Investigation uncovered and disrupted a large-scale cyber fraud infrastructure, which it calls a “phishing SMS factory,” that sent lakhs of smishing…
India’s Central Bureau of Investigation uncovered and disrupted a large-scale cyber fraud infrastructure, which it calls a “phishing SMS factory,” that sent lakhs of smishing…
Two recent cybersecurity incidents involving financial services providers have exposed the personal information of millions of individuals, highlighting ongoing risks across the fintech and credit…
A newly discovered account takeover campaign targeting WhatsApp users demonstrates how attackers can compromise messaging accounts without stealing passwords or exploiting technical vulnerabilities. The threat,…
A popular browser extension promoted as a free and secure VPN has been discovered secretly capturing user conversations across multiple AI chatbot platforms including ChatGPT,…
The security vulnerability known as React2Shell is being exploited by threat actors to deliver malware families like KSwapDoor and ZnDoor, according to findings from Palo…
Workplace technology is entering a new phase. The findings from CCS Insight’s Survey: Employee Workplace Technology, 2025 reveal a landscape where established work habits persist…
Jaguar Land Rover (JLR) has officially confirmed that a major cyberattack in August resulted in the theft of sensitive personal data belonging to current and…
Thank you for joining! Access your Pro+ Content below. 16 December 2025 Is AI more than hot air? Share this item with your network: In…
SoundCloud has confirmed a cyberattack on its platform after days of user complaints about service disruptions and connectivity problems. In what is being reported as…
An active intrusion is targeting critical authentication bypass vulnerabilities in Fortinet’s FortiGate appliances and related products. Threat actors are exploiting CVE-2025-59718 and CVE-2025-59719 to perform…
A critical local privilege escalation vulnerability in the JumpCloud Remote Assist for Windows agent allows any low-privileged user on a Windows system to gain NT AUTHORITYSYSTEM privileges or crash…
Phishing is still a go-to tactic for attackers, which is why even small gains in user training are worth noticing. A recent research project from…