Operation BULUT: Encrypted Chats from Sky ECC, ANOM Lead to 232 Arrests
Intelligence from encrypted platforms like Sky ECC and ANOM has led to the arrest of 232 individuals and…
More results...
Intelligence from encrypted platforms like Sky ECC and ANOM has led to the arrest of 232 individuals and…
In late March 2025, as Indian Air Force (IAF) transport aircraft delivered humanitarian aid to earthquake-stricken Myanmar, pilots encountered a sophisticated electronic threat in the form of GPS spoofing. This comprehensive analysis examines the incident, identifies the likely perpetrators, and explores the broader implications of this emerging form of electronic warfare deployed against
India’s G20 Sherpa, Amitabh Kant, highlighted the escalating threat of cyber warfare at the launch of the Cyber Sikshit Bharat initiative in New Delhi on April 15, 2025. Describing cyber warfare as "silent, borderless, and anonymous," Kant underscored the urgency of addressing this challenge, particularly given the 300% rise in cyberattacks in India between 2021 and 2024.He revealed that during
Hertz Corporation disclosed a data breach after customer data was stolen via Cleo zero-day exploits in late 2024, affecting Hertz, Thrifty, and Dollar brands. Car rental giant Hertz Corporation disclosed a data breach that impacted its Hertz, Thrifty, and Dollar brands. Threat actors gained access to customer data via Cleo zero-day exploits in late 2024. […]
The Indian Air Force (IAF) has responded to reports of GPS spoofing incidents during its humanitarian relief operations in Myanmar following a devastating earthquake in late March 2025. The IAF emphasized that all missions were completed safely, with precautionary measures in place to address potential navigation challenges.Between March 29 and April 1, IAF aircraft, including C-130J Super
New malware ‘ResolverRAT’ is targeting healthcare and pharmaceutical firms, using advanced capabilities to steal sensitive data. Morphisec researchers discovered a new malware dubbed ‘ResolverRAT’ that is targeting healthcare and pharmaceutical firms, using advanced capabilities to steal sensitive data. ResolverRAT spreads via phishing emails using localized languages and legal lures. Victims download a malicious file triggering […]
Threat actors deploy malicious NPM packages to steal PayPal credentials and hijack cryptocurrency transfers. Fortinet researchers discovered multiple malicious NPM packages that are used to target PayPal users. The packages were uploaded to the repository in early March by a threat actor known as tommyboy_h1 and tommyboy_h2, and were used to steal PayPal credentials and hijack cryptocurrency transfers. “Using PayPal-related […]
Threat actors deploy malicious NPM packages to steal PayPal credentials and hijack cryptocurrency transfers. Fortinet researchers discovered multiple malicious NPM packages that are used to target PayPal users. The packages were uploaded to the repository in early March by a threat actor known as tommyboy_h1 and tommyboy_h2, and were used to steal PayPal credentials and hijack cryptocurrency transfers. “Using PayPal-related […]
The operators of the Phishing-as-a-Service (PhaaS) platform Tycoon2FA have rolled out significant updates to enhance its evasion capabilities. Tycoon2FA, a phishing kit discovered in 2023 by cybersecurity firm Sekoia, was recently updated to improve its evasion capabilities. The phishing kit now uses advanced evasion tactics such as a custom CAPTCHA via HTML5 canvas, invisible Unicode […]
Cell C, one of the biggest telecom providers in South Africa confirms a data breach following a 2024 cyberattack. Cell C is the fourth-largest mobile network operator in South Africa, ,after Vodacom, MTN, and Telkom. The company founded in 2001 offers prepaid and postpaid mobile plans, data bundles and internet services, fiber broadband, roaming and […]