Headlines
  • Iran claimed that since the war with the US and Israel started on February 28, over 3,400 people had died.
  • On Saturday night, the Islamic Revolutionary Guard Corps (IRGC) of Iran threatened to strike any ship that approached the Strait of Hormuz.
  • India's Ministry of External Affairs called the Iranian ambassador to India to discuss the "serious incident" involving two Indian-flagged ships that were fired upon on Saturday in the Strait of Hormuz.
  • Iran said that it is examining fresh U.S. proposals that were communicated through Pakistan's mediators, but it has not yet responded.
  • Hezbollah leader Naim Qassem vowed on Saturday that his fighters would retaliate against Israeli attacks on Lebanon and stated that the current 10-day ceasefire with Israel cannot be one-sided.

Tag: Cyber Security

November 13, 2025

An Alarming Trend:Growing Use of AI...

Cybercriminals scale their operations and launch widespread strikes on multiple targets with minimal effort due to the increased accessibility of Artificial Intelligence.

November 12, 2025

AI Powered Crypto Currency Scam

Artificial intelligence is used by AI Crypto Scams to trick and manipulate victims. These frauds usually use automated trading systems that guarantee profits, phishing schemes with AI chatbots, or deepfakes, which are AI-generated voice or video recordings.

November 11, 2025

Baiting Attack

A form of social engineering known as “baiting” involves cybercriminals luring the victim with alluring promises or rewards.Cybercriminals can deceive targets into installing malware, compromising passwords, or transferring money by luring them to accept fake offers.

November 10, 2025

AI Cyber Staking

According to UNODC, cyberstalking is the use of information and communications technology to repeatedly harass, annoy, attack, threaten, frighten, and/or verbally abuse people.

November 7, 2025

Indentity Theft in Cyber Crime

The unauthorized use of personal information to perpetrate fraud or other crimes is referred to as Identity theft. This theft is carried out by obtaining personal information, which is then used to commit financial fraud and data breaches by pretending to be a real person

November 6, 2025

India’s Cybercrime Scenarios

Cyber attacks are becoming a major problem in today’s digital environment. Cybercriminals are always using the Internet to undertake sophisticated attacks against both governments and organizations.

November 5, 2025

Secure Access Service Edge

Secure Access Service Edge, or SASE, is a cloud-based technology.Accorsing to Gartner, SD-WAN, SWG, CASB, NGFW, and zero trust network access (ZTNA) are among the convergent network and security as a service features provided by Secure Access Service Edge (SASE).

November 4, 2025

Application Security

Application Security describes security measures at the application level that aim to prevent data or code within the app from being stolen or hijacked. It encompasses the security.

November 3, 2025

Hardware Security

The technologies and procedures used to shield a system’s or device’s physical components against tampering, illegal access, and other harmful actions are referred to as hardware security.

October 31, 2025

AI Powered Scam Trend in 2025

AI powered Scams are increasing in 2025. Artificial intelligence is being used by scammers to make their schemes more convincing and difficult to spot, from phishing emails and SMS phishing messages to deepfake videos and audios.

Top