News

Alleged Google Pixel 7A Gets Listed on eBay
It is that time of the year again when we start getting leaks about the next-gen affordable Google Pixel A series, which usually gets announced at the…

Fortinet Cyber Security Update Fails; Zero-Day Exploited by Threat Actors
A week ago, Cyber Security firm Fortinet pushed out a security update to fix a high-severity security vulnerability CVE-2022-41328, allowing threat actors to execute unauthorized commands or…

Bitwarden Password Manager’s Autofill Feature Vulnerable to iframe-based Credential Theft
Bitwarden's Autofill Feature Poses Major Security Threat as Flaw Exposes Credentials to Malicious Iframe, Reveals Flashpoint's Analysts

BidenCash Leak: 2M+ Credit/Debit Cards with Personal Info Exposed
Security researchers at Cyble spotted a leaked database of about 2,165,700 (Debit & credit cards) by BidenCash, celebrating its first anniversary. For those who don't know, BidenCash…

Vivo V27 Series with Color Changing Rear Panel Launched in India
After leaks & teasers, Vivo has finally unveiled its Vivo V27 series in India. As we know, the VivoV27 series includes three phones under it, i.e., the…

Xiaomi 13 Pro with Sony 1-inch Sensor Launched in India
The much-awaited Xiaomi 13 series has made its Global debut, and now it's time for the Indian Launch. The company has finally launched the Xiaomi 13 series…

Xiaomi 13 & 13 Lite Launched Globally w/ Snapdragon 8 Gen 2
Xiaomi at the Mobile World Congress has finally announced the Global Debut of the Xiaomi series. The Xiaomi 13 series includes three under it, i.e., Xiaomi 13…

Threat Actors Exploit OpenAI’s ChatGPT Popularity to Distribute Malware
As you may have been already familiar with the Open Ai’s ChatGPT. Well, ChatGPT is a chatbox, built on GPT family 3 of the large language model.…

Vivo V27 Series Set to Launch on March 1 in India
Just after getting leaked via a Flipkart listing a couple of days ago, Vivo has finally confirmed that it will launch its Vivo V27 series in India…

ProxyShellMiner Malware Exploits Vulnerabilities for Cryptocurrency Mining
In a new malware discovery named ProxyShellMiner, the malware exploits the ProxyShell vulnerabilities to install cryptocurrency miners all around the Windows domain to make a profit for…