Headlines
  • After a temporary suspension, Emirates said the airline "will resume operations."
  • On Saturday, US President Donald Trump said that Iran will be "hit very hard" and that he was thinking about extending the strikes to other targets..
  • At least five ballistic missile launches from Iran have been detected by the Israelis since midnight.
  • Mehrabad Airport in Tehran is hit by strikes
  • The Prince Sultan Air Base was the target of a ballistic missile that Saudi Arabia's military intercepted and destroyed, according to the country's defense ministry.
  • Heavy gunfire on Friday injured three peacekeepers from the United Nations Interim Force in Lebanon inside their base in southwest Lebanon.
  • To put an end to the bloodshed, UN Secretary-General AntĂłnio Guterres urged serious diplomatic negotiations..
  • In a social media post, President Trump said that "no deal" other than "unconditional surrender" will be with Iran.
  • Iran reportedly receives intelligence from Russia on US targets.

Tag: Cyber Security

October 15, 2025

Drastic Rise of ‘Digital Arrest’ in...

The rise of digital arrest as a cybercrime poses a serious challenges for law inforcements in India.There has been an increase in digital arrest scams in India. Scammers use technology to pretend to be government or law enforcement officials in order to coerce victims into complying by intimidating and psychologically manipulating them.In digital arrest, victim is being wrongly accused of a crime.

October 14, 2025

Be Cautious About Deepfake Nudes

Using artificial intelligence (AI), deepfake imagery is generated by projecting a voice or face image onto another person’s body, effectively swapping their voices or faces.

October 13, 2025

Work From Home Scam

More flexible career options brought about by the rise in remote work have increased the number of fake job postings and work-from-home scams.

October 9, 2025

Supply Chain Attack

A supply chain attack is a type of cyberattack that targets at a reliable third-party vendor that provides software or services vital to the supply chain.

October 7, 2025

Evil Twin Attack

When a hacker installs a fake Wi-Fi access point that looks like a real one, it’s known as an evil twin attack. It is intended to trick users into connecting to this rogue access point by making them believe they are connecting to a reliable network.

October 3, 2025

Code Injection Attacks

The term “code injection” refers attacks in which malicious code is injected into an application. The performance and functionality of the program are then impacted as the code is interpreted or run by the application. Existing data vulnerabilities, like improper processing of data from untrusted sources, are usually exploited by code injection attacks.

October 2, 2025

AI Powered Cyber Stalking

With the use of artificial intelligence, stalking is becoming faster and difficult to detect.With misuse of AI techniques like deepfakes, automated tracking, voice cloning, and AI chatbots, cyberstalking has changed in 2025, becoming more challenging to detect.

October 1, 2025

Zero Day Cyber Attacks

Cyber criminals gain an unfair edge by using malicious tools known as “zero-day exploits,” which take advantage of unknown flaws in firmware, hardware, or software.

September 30, 2025

GenAI in Cyber Security

In cybersecurity, generative AI is an effective weapon for both cyber criminals and for businesses and organisations who want to protect their networks and devices.

September 29, 2025

Be Prepared for Increasingly Complex AI...

AI-powered cyberattack uses machine learning  algorithms to do malicious activities.These attacks are increasingly complex, focused, and difficult to detect since they automate using artificial intelligence.

Top