Divya

BitConnect Scam Exposed as Indian Authorities Seize Illicit Gains

The Directorate of Enforcement (ED) in Ahmedabad has dealt a significant blow to one of history’s largest cryptocurrency frauds, recovering Rs.…

2 weeks ago

Black-Hat SEO Poisioning Attacks Exploit Indian Government and Financial Websites

A sophisticated black-hat SEO poisoning campaign has compromised over 150 Indian government websites and financial institutions, redirecting millions of users…

2 weeks ago

Juniper Issues Warning About Critical Authentication Bypass Vulnerability

Juniper Networks has issued an urgent security bulletin for its Session Smart Router, Session Smart Conductor, and WAN Assurance Router…

2 weeks ago

Fake Timesheet Report Emails Linked to Tycoon 2FA Phishing Kit

Cybersecurity researchers have uncovered a novel phishing campaign distributing the notorious Tycoon 2FA phishing kit through fraudulent timesheet notification emails,…

2 weeks ago

Microsoft Text Services Framework Exploited for Stealthy Persistence

A novel persistence mechanism exploiting Microsoft's Text Services Framework (TSF) has been uncovered by researchers at Praetorian Labs, revealing a…

2 weeks ago

LibreOffice Vulnerabilities Allow Attackers to Write to Files and Extract Data

Two critical vulnerabilities in LibreOffice (CVE-2024-12425 and CVE-2024-12426) expose millions of users to file system manipulation and sensitive data extraction…

2 weeks ago

ChatGPT Operator Prompt Injection Exploit Leaks Private Data

According to recent findings by cybersecurity researcher Johann Rehberger, OpenAI’s ChatGPT Operator, an experimental agent designed to automate web-based tasks,…

2 weeks ago

Xerox Printer Vulnerability Exposes Authentication Data Via LDAP and SMB

A critical security vulnerability in Xerox’s Versalink C7025 Multifunction Printer (MFP) has been uncovered, exposing enterprise networks to credential theft…

3 weeks ago

CISA Warns of Active Exploitation of Apple iOS & iPadOS Vulnerability

The Cybersecurity and Infrastructure Security Agency (CISA) has issued an urgent advisory warning of active exploitation of a critical security…

3 weeks ago

IDOR Vulnerability in ExHub Allows Attackers to Alter Hosting Configurations

A security researcher recently uncovered a high-risk Insecure Direct Object Reference (IDOR) vulnerability in ExHub, a cloud hosting and collaboration…

3 weeks ago