In a major international law enforcement operation dubbed “Operation Deep Sentinel,” authorities have successfully dismantled the notorious darknet marketplace “Archetyp Market,” one of the world’s […]
Zoomcar Data Breach Exposes Sensitive Details of 8.4 Million Users
Zoomcar Holdings, Inc., the prominent car-sharing platform, has confirmed a significant data breach that has compromised the personal information of approximately 8.4 million users. The […]
North Korean APT Hackers Target Ukrainian Government Agencies to Steal Login Credentials
North Korean Advanced Persistent Threat (APT) hackers, specifically the Konni group, have shifted their focus to Ukrainian government agencies in a targeted phishing campaign aimed […]
GrayAlpha Hackers Group Exploits Browser Updates to Deploy PowerNet Loader and NetSupport RAT
A new infrastructure linked to GrayAlpha, a cybercriminal entity overlapping with the notorious FIN7 group, has been exposed. This financially motivated threat actor, active since […]
Hackers Compromise Discord Invite to Inject Malicious Links Delivering AsyncRAT
Threat actors have exploited Discord’s invite system to distribute malicious links, ultimately delivering AsyncRAT and other harmful payloads. Discord, a widely trusted platform for gamers, […]
Anubis Ransomware Introduces Irreversible File Destruction Feature
A new and menacing player has emerged in the cybercrime landscape with the introduction of Anubis, a Ransomware-as-a-Service (RaaS) operation that blends traditional file encryption […]
Microsoft Purview DLP Now Controls Copilot’s Access to Sensitive Email Data
Microsoft is set to enhance data security in Microsoft 365 by extending Purview Data Loss Prevention (DLP) controls to Copilot’s handling of sensitive email data. […]
Over 20 Malicious Google Play Apps Steal Users’ Login Credentials
A major security alert has been issued for Android users after cybersecurity researchers uncovered more than 20 malicious applications on the Google Play Store designed […]
Uncovering the Technique of Hiding Images in DNS TXT Entries
A curious technique has emerged: hiding images inside DNS TXT records. This approach, which at first glance seems unorthodox, leverages the flexibility of DNS TXT records […]
KIA Ecuador Keyless Entry Systems Vulnerability Faces Major Theft Threat
A critical security flaw has been uncovered in the keyless entry systems (KES) widely used in KIA vehicles across Ecuador, exposing thousands of cars to […]