A recent cybersecurity analysis has unveiled a critical vulnerability affecting widely-used AI platforms such as ChatGPT, Google Gemini, and other generative AI tools. This newly […]
Month: July 2025
Cybercriminals Exploit Raspberry Pi to Breach ATM Networks
In a recent cybersecurity incident, the financially motivated threat group UNC2891 executed a sophisticated attack on banking infrastructure by physically installing a 4G-equipped Raspberry Pi […]
Gunra Ransomware Expands to Linux: A New Threat to Cross-Platform Security
In April 2025, the cyber threat landscape witnessed the emergence of Gunra ransomware, a formidable malware strain initially targeting Windows systems. This ransomware quickly gained […]
Critical Authentication Bypass Vulnerability in OAuth2-Proxy: Exploiting Query Parameter Manipulation
A significant security flaw has been discovered in OAuth2-Proxy, a widely utilized open-source tool that provides authentication services for various identity providers, including Google, Azure, […]
Critical CrushFTP Zero-Day Vulnerability Exposes Servers to Remote Code Execution
A critical zero-day vulnerability has been identified in CrushFTP, a widely used file transfer server, allowing unauthenticated attackers to execute arbitrary code remotely on affected […]
Escalating Cyber Threats in the Maritime Industry: A Deep Dive into APT-Driven Ransomware Attacks
The maritime industry, responsible for approximately 90% of global trade, has become a prime target for advanced persistent threat (APT) groups deploying sophisticated ransomware campaigns. […]
Bangalore Engineer Arrested in Connection with $44 Million CoinDCX Cryptocurrency Theft
In a significant development within the cryptocurrency sector, Rahul Agarwal, a 30-year-old software engineer employed by CoinDCX, one of India’s leading crypto exchanges, has been […]
Global Cyberattack Exploits Microsoft SharePoint Zero-Day Vulnerability, Impacting African Nations
A sophisticated cyberattack has exploited a zero-day vulnerability in Microsoft SharePoint servers, compromising over 400 entities worldwide, with significant impacts in African nations such as […]
Leveraging LLM Honeypots to Deceive Cyber Threat Actors
In the ever-evolving landscape of cybersecurity, researchers have made significant strides by employing Large Language Model (LLM) honeypots to effectively deceive cyber threat actors. These […]
Cybercriminals Exploit Raspberry Pi to Breach ATM Networks
In a recent and sophisticated cyberattack, a financially motivated group identified as UNC2891 infiltrated banking infrastructure by physically installing a 4G-enabled Raspberry Pi device into […]