Headlines
  • Iran claimed that since the war with the US and Israel started on February 28, over 3,400 people had died.
  • On Saturday night, the Islamic Revolutionary Guard Corps (IRGC) of Iran threatened to strike any ship that approached the Strait of Hormuz.
  • India's Ministry of External Affairs called the Iranian ambassador to India to discuss the "serious incident" involving two Indian-flagged ships that were fired upon on Saturday in the Strait of Hormuz.
  • Iran said that it is examining fresh U.S. proposals that were communicated through Pakistan's mediators, but it has not yet responded.
  • Hezbollah leader Naim Qassem vowed on Saturday that his fighters would retaliate against Israeli attacks on Lebanon and stated that the current 10-day ceasefire with Israel cannot be one-sided.

Tag: Cyber Security

October 16, 2025

The Use of AI in Cyberattacks

As artificial intelligence (AI) advances, many cybercriminals can use it to launch more complex and focused attacks like deepfake technology and phishing.

October 15, 2025

Drastic Rise of ‘Digital Arrest’ in...

The rise of digital arrest as a cybercrime poses a serious challenges for law inforcements in India.There has been an increase in digital arrest scams in India. Scammers use technology to pretend to be government or law enforcement officials in order to coerce victims into complying by intimidating and psychologically manipulating them.In digital arrest, victim is being wrongly accused of a crime.

October 14, 2025

Be Cautious About Deepfake Nudes

Using artificial intelligence (AI), deepfake imagery is generated by projecting a voice or face image onto another person’s body, effectively swapping their voices or faces.

October 13, 2025

Work From Home Scam

More flexible career options brought about by the rise in remote work have increased the number of fake job postings and work-from-home scams.

October 9, 2025

Supply Chain Attack

A supply chain attack is a type of cyberattack that targets at a reliable third-party vendor that provides software or services vital to the supply chain.

October 7, 2025

Evil Twin Attack

When a hacker installs a fake Wi-Fi access point that looks like a real one, it’s known as an evil twin attack. It is intended to trick users into connecting to this rogue access point by making them believe they are connecting to a reliable network.

October 3, 2025

Code Injection Attacks

The term “code injection” refers attacks in which malicious code is injected into an application. The performance and functionality of the program are then impacted as the code is interpreted or run by the application. Existing data vulnerabilities, like improper processing of data from untrusted sources, are usually exploited by code injection attacks.

October 2, 2025

AI Powered Cyber Stalking

With the use of artificial intelligence, stalking is becoming faster and difficult to detect.With misuse of AI techniques like deepfakes, automated tracking, voice cloning, and AI chatbots, cyberstalking has changed in 2025, becoming more challenging to detect.

October 1, 2025

Zero Day Cyber Attacks

Cyber criminals gain an unfair edge by using malicious tools known as “zero-day exploits,” which take advantage of unknown flaws in firmware, hardware, or software.

September 30, 2025

GenAI in Cyber Security

In cybersecurity, generative AI is an effective weapon for both cyber criminals and for businesses and organisations who want to protect their networks and devices.

Top