Access Denied

0

Access Denied You don’t have permission to access “http://hindi.gadgets360.com/internet/how-to-check-your-data-is-sharing-with-facebook-and-instagram-parent-company-meta-follow-guide-news-10943540” on this server.

Reference #18.4d560e17.1774136992.c685768

https://errors.edgesuite.net/18.4d560e17.1774136992.c685768

Trump says talks with Iran continuing amid tensions | Donald Trump

0

NewsFeed

US President Donald Trump has said that talks with Iran are continuing to try to de-escalate tensions in the Gulf, even as the US military announced shooting down an Iranian drone that approached its aircraft carrier in the Arabian Sea.



Source link

AXISCADES secures US orders worth ₹13.5 crore after India-US trade deal

0

AXISCADES Technologies Ltd announced Wednesday it has secured its first design and build orders from two major US companies, with an initial value of approximately ₹13.5 crore. The announcement coincides with the signing of a trade agreement between US President Donald Trump and Indian Prime Minister Narendra Modi.

The Bengaluru-based technology company said the orders came from a leading US homeland security firm and a global marketing and audience engagement company. The deals represent the first “Make in India” production engagement with these clients, building on an existing partnership.

AXISCADES operates through its subsidiary Mistral Solutions and specializes in aerospace, defense, electronics, semiconductor and artificial intelligence applications. The company described the orders as strengthening its position as a global engineering and manufacturing partner while enhancing long-term revenue visibility.

The firm said the contracts demonstrate its ability to capitalize on closer US-India strategic and industrial cooperation following the trade agreement. AXISCADES employs over 3,000 professionals across 17 locations globally, including offices in France, Germany, Denmark, the United States and Canada.

The company works with semiconductor, automotive and defense clients, with expertise spanning weapon systems, avionics, radar and electronic warfare systems.

The shares of AXISCADES Technologies Ltd were trading on the NSE today at ₹1,228.30 up by ₹58.40 or 4.99 per cent, hitting its upper circuit at mid day trading.

More Like This

Published on February 4, 2026

Gold rate today Feb 4 : Gold rates up in Mumbai, Delhi, Chennai, Kolkata, Ahmedabad & Bengaluru

0

Gold rings are displayed at a gold shop, February 3, 2026.

Gold rings are displayed at a gold shop, February 3, 2026. | Photo Credit: CHALINEE THIRASUPA

Gold prices in India have seen an upward trend today, February 4, with an increase seen across all major cities. The price of both 22-carat and 24-carat gold has risen compared to yesterday’s rates. This report provides a detailed, city-by-city breakdown of today’s gold prices.

Gold Rate in India

The average price for 22-carat gold in india today is ₹14,765 per gram, marking an increase of ₹805. For 8 grams, the price is ₹1,18,120, up by ₹6,440. The 24-carat gold price stands at ₹15,503 per gram (up by ₹845) and ₹1,24,024 for 8 grams (up by ₹6,760).

Gold Rate in Mumbai

In Mumbai, the price for 1 gram of 22-carat gold today is ₹14,765 per gram, marking an increase of ₹805. For 8 grams, the price is ₹1,18,120, up by ₹6,440. The 24-carat gold price stands at ₹15,503 per gram (up by ₹845) and ₹1,24,024 for 8 grams (up by ₹6,760).

Gold Rate in Chennai

Chennai’s gold rates have also seen a jump. A gram of 22-carat gold is priced at ₹14,900, a rise of ₹870. An 8-gram piece costs ₹1,19,200, up by ₹6,960. For 24 carat goldthe price is ₹15,645 per gram, an increase of ₹913, and ₹1,25,160 for 8 grams, up by ₹7,304.

Gold Rate in Hyderabad

Hyderabad’s 22-carat gold price ₹14,900, a rise of ₹870. An 8-gram piece costs ₹1,19,200, up by ₹6,960.

The 24-carat gold rateis ₹15,645 per gram, an increase of ₹913, and ₹1,25,160 for 8 grams, up by ₹7,304.

Gold Rate in Delhi

In Delhi, the price of 22-carat gold is ₹14,815 per gram (up by ₹805) and ₹1,18,520 for 8 grams (up by ₹6,440). The 24-carat gold price is ₹15,556 per gram, a jump of ₹845, while 8 grams costs ₹1,25,448, up by ₹6,760.

Gold Rate in Ahmedabad

Ahmedabad’s gold prices also reflect the national trend. The price for 1 gram of 22-carat gold is ₹14,819, an increase of ₹805, and ₹1,18,552 for 8 grams, up by ₹6,440. For 24-carat gold, the price is ₹15,560 per gram (up by ₹845) and ₹1,24,480 for 8 grams (up by ₹6,760).

Gold Rate in Kolkata

In Kolkata1 gram of 22-carat gold is priced at ₹14,865, up by ₹805, and 8 grams at ₹1,18,920, up by ₹6,440. The price for 24-carat gold is ₹15,608 per gram, an increase of ₹845, while 8 grams is priced at ₹1,24,864, up by ₹6,760.

Gold Rate in Bengaluru

Bengaluru also witnessed a rise in gold rates. The price of 22-carat gold is ₹14,825 per gram (up by ₹805) and ₹1,18,600 for 8 grams (up by ₹6,440). The 24-carat gold price is ₹15,566 per gram (up by ₹845) and ₹1,24,528 for 8 grams (up by ₹6,760).

Gold Rates Courtesy: bankbazaar.com

More Like This

The probability of a Fed rate cut next month inched down to 69 per cent on Monday, after jumping to 74 per cent in the previous session, according to the CME FedWatch Tool.

Published on February 4, 2026

US shoots down Iranian drone flying towards aircraft carrier, navy says | US military

0

The US military says it shot down an Iranian drone that “aggressively” approached the Abraham Lincoln aircraft carrier in the Arabian Sea.

The Iranian Shahed-139 drone was flying toward the carrier “with unclear intent” when an F-35 fighter jet shot it down, US Central Command said on Tuesday.

“An F-35C fighter jet from Abraham Lincoln shot down the Iranian drone in self-defence and to protect the aircraft carrier and personnel on board,” Capt Tim Hawkins, a navy spokesperson at Central Command, said. No US service members were harmed or equipment damaged, he said.

Iran’s UN mission declined to comment on the claims, while Iran’s Tasnim news agency said connection had been lost with a drone in international waters, but the reason was unknown. The semi-official Fars news agency reported that an Iranian drone had completed a “surveillance mission in international waters”.

Central Command said that in another incident on Tuesday, in the Strait of Hormuz, Iran’s Revolutionary Guards (IRGC) harassed a US-flagged and crewed merchant vessel. “Two IRGC boats and an Iranian Mohajer drone approached M/V Stena Imperative at high speeds and threatened to board and seize the tanker,” Hawkins said.

The drone incident came as diplomats attempted to arrange nuclear talks between Iran and the US, and Donald Trump said that with US warships heading toward Iran “bad things” would probably happen unless a deal could be reached.

Iran’s president, Masoud Pezeshkian, said on that Tuesday he had instructed the country’s foreign minister to “pursue fair and equitable negotiations” with the US, the first clear sign Tehran wants to negotiate with Washington.

Trump envoy Steve Witkoff is still planning to hold talks with Iranian officials in Turkey later this week despite the drone incident, White House press secretary Karoline Leavitt said, in the first direct acknowledgment of the talks by the White House.

However, Iran’s foreign ministry spokesperson said consultations were still underway on the venue, Iranian Nour News reported later on Tuesday, amid reports Tehran wanted them held in Oman rather than Turkey, and narrowed to discussing only nuclear-related issues. The foreign ministry spokesperson was quoted by Nour News as saying that Turkey, Oman and several other countries had expressed a readiness to host the meeting.

Pezeshkian’s announcement marked a significant turn for the reformist president, who had told Iranians for weeks that the turmoil in the country had gone beyond his control. It also indicated that he had the support of Iran’s supreme leader, Ayatollah Ali Khamenei, for talks, which the 86-year-old cleric had previously dismissed.

The Lincoln carrier strike group is the most visible part of a US military buildup in the Middle East after a violent crackdown against anti-government demonstrations in Iran last month, the deadliest domestic unrest since the 1979 revolution.

Trump, who stopped short of carrying out his threat to intervene during the crackdown, has since demanded Tehran make nuclear concessions, and has sent a flotilla to its coast. He said last week Iran was “seriously talking”.



Source link

Uproar in Parliament: Speaker Om Birla lashed out at the opposition, taught a lesson of decorum on sloganeering with placards in the Lok Sabha – Parliament Uproar Speaker Om Birla Lashed Out Over Opposition Decorum Lesson For Raising Slogans With Placards

0

There is a fierce dispute between the party and the opposition in the budget session of the Parliament. On one hand, Rahul Gandhi is cornering the government on his China border dispute issue, on the other hand, the government is responding to it. Meanwhile, the opposition is also targeting the government regarding the trade agreement between India and America a day ago. A day ago, a press conference was held by Union Minister Piyush Goyal regarding the India-US trade agreement and today he also stood up in the Lok Sabha to speak on this issue.



Also read – Rahul Shows Naravane Book: Former Army Chief Naravane’s alleged book surfaced! Rahul Gandhi showed up outside the Parliament

Speaker spoke on the uproar by opposition MPs
During his speech, opposition MPs protested by banging tables and creating ruckus. During this, the opposition raised slogans to allow Rahul Gandhi to speak and also came to the well. On this, Speaker Om Birla said- Balu ji, you are a senior leader, do you like this? Opposition MPs arrived with posters. During this, the speaker said – Opposition MPs are breaking the decorum. You cannot bend the regime. Opposition is based on arguments. Importance lies on issues. It is not right to create this ruckus.


Also read – Video: ‘My traitor friend’, Rahul’s taunt on seeing the Union Minister, Ravneet Bittu’s counterattack; Called ‘enemy of the country’

There is a way to protest – Om Birla
Amid continuous sloganeering by opposition members, Lok Sabha Speaker Om Birla said, ‘I believe that despite being in the government for a long time, you are violating the decorum and dignity of the House. There is one way to protest, there may be other ways, but all of you are leaving your designated seats and going to the other side. If you violate dignity in this way, the people of the country will lose faith in democracy. You all are senior leaders, but it is not appropriate to violate the rules of the House. Protest does not happen through sloganeering or carrying posters, protest happens through words and logical arguments.

other videos

Sansad Budget Session Live: Lok Sabha proceedings adjourned till 2 pm due to uproar, Question Hour continues in Rajya Sabha – Parliament Budget Session Day 6 Live Updates Pm Modi Reply To Discussion In Lok Sabha Rajya Sabha Proceedings

0

12:18 PM, 04-Feb-2026

Lok Sabha proceedings adjourned till 2 pm, Speaker lashed out at the uproar

Union Commerce Minister Piyush Goyal read out his full statement in the Lok Sabha today amid sloganeering by opposition parties. Regarding the trade deal with America, he said that it is committed to protecting the interests of farmers and livestock farmers. Goyal continuously stressed that allegations like compromising with the interests of the country are baseless. The opposition is deliberately playing with parliamentary dignity.

12:05 PM, 04-Feb-2026

Statement of Commerce Minister Piyush Goyal in Lok Sabha

Piyush Goyal in Lok Sabha – Photo: YouTube Video Grab- @Sansad TV

Commerce Minister Piyush Goyal gave an official statement on behalf of the government in the Lok Sabha on the trade deal with America. He said that India’s interests have not been compromised. The government is committed to the welfare of the farmers and businessmen of the country. Earlier, Goyal had also held a press conference on this topic on Tuesday. He had said that Prime Minister Narendra Modi has not allowed the national interest to be compromised in the trade agreement signed with America.

11:05 AM, 04-Feb-2026

Uproar continues in Lok Sabha, proceedings adjourned within minutes

Lok Sabha proceedings – Photo: YouTube Video Grab- @Sansad TV

Sloganeering against the government and uproar by opposition parties continues in the Lok Sabha. Speaker Om Birla had to adjourn the proceedings of the House within a few minutes. After the start of Question Hour on Wednesday, BJP MP from Jharkhand Nishikant Dubey asked a question regarding the impact of PMGKAY and Public Distribution System (PDS). Meanwhile, the sloganeering continued. Amidst the uproar, Union Minister of State Nimuben Jayantibhai Bambhania answered the question. Speaker Om Birla appealed for help in conducting the proceedings of the House and said that it is the responsibility of all MPs to maintain the dignity of Parliament by behaving decently. As the ruckus did not stop, he adjourned the proceedings of the House till 12 noon. Proceedings are going on in Rajya Sabha.

07:24 AM, 04-Feb-2026

Sansad Budget Session LIVE: Lok Sabha proceedings adjourned till 2 pm due to uproar, question hour continues in Rajya Sabha

The budget session of Parliament started from 28th January. During the sixth day of proceedings today, Prime Minister Narendra Modi will reply to the discussion on the motion of thanks moved on the President’s address in the Lok Sabha. Earlier on Tuesday, the fifth day of proceedings in the Lok Sabha was marred by uproar. On the other hand, discussion continued in the Rajya Sabha on the motion of thanks brought on the President’s address. In fact, in the Lok Sabha, Rahul Gandhi, citing a magazine, sought permission to quote excerpts from an unpublished book, to which the ruling party objected. The opposition accused the government of suppressing its voice and said that the government is running away from discussion and does not want to discuss important issues like national security.

Read this also- Parliament Budget Session: Uproar over Rahul’s statement in Lok Sabha, proceedings adjourned; Discussion held in Rajya Sabha

Uproar over Rahul Gandhi’s statement, eight Lok Sabha MPs suspended
After the uproar in the Lok Sabha, Congress MP and Leader of Opposition in the House, Rahul Gandhi, on the question of journalists, said that the leader of the opposition is not being allowed to speak in the Parliament. Disciplinary action was also taken against eight MPs who entered the well of the Lok Sabha amid the uproar and noise and threw papers towards the Speaker’s seat. At around 3.03 pm on Tuesday, seven Congress and one CPM MPs were suspended from the entire budget session. Presiding Chairman Dilip Saikia mentioned the names of the eight MPs after the proceedings began at 3 o’clock. After this, Parliamentary Affairs Minister Kiren Rijiju proposed that these eight MPs, who violated parliamentary decorum, should be suspended from the entire session under the rules.

Read this also- Dignity broken in Parliament: Eight MPs who threw papers towards Lok Sabha Speaker’s seat suspended, proceedings adjourned till tomorrow

Proxy Botnet, Office Zero-Day, MongoDB Ransoms, AI Hijacks & New Threats

0

Ravie LakshmananFeb 02, 2026Hacking News / Cybersecurity

Every week brings new discoveries, attacks, and defenses that shape the state of cybersecurity. Some threats are stopped quickly, while others go unseen until they cause real damage.

Sometimes a single update, exploit, or mistake changes how we think about risk and protection. Every incident shows how defenders adapt — and how fast attackers try to stay ahead.

This week’s recap brings you the key moments that matter most, in one place, so you can stay informed and ready for what’s next.

⚡ Threat of the Week

Google Disrupts IPIDEA Residential Proxy Network — Google has crippled IPIDEA, a massive residential proxy network consisting of user devices that are being used as the last-mile link in cyberattack chains. According to the tech giant, not only do these networks permit bad actors to conceal their malicious traffic, but they also open up users who enroll their devices to further attacks. Residential IP addresses in the U.S., Canada, and Europe were seen as the most desirable. Google pursued legal measures to seize or sinkhole domains used as command‑and‑control (C2) for devices enrolled in the IPIDEA proxy network, cutting off operators’ ability to route traffic through compromised systems. The disruption is assessed to have reduced IPIDEA’s available pool of devices by millions. The proxy software is either pre-installed on devices or may be willingly installed by users, lured by the promise of monetizing their available internet bandwidth. Once devices are registered in the residential proxy network, operators sell access to it to their customers. Numerous proxy and VPN brands, marketed as separate businesses, were controlled by the same actors behind IPIDEA. The proxy network also promoted several SDKs as app monetization tools, quietly turning user devices into proxy exit nodes without their knowledge or consent once embedded. IPIDEA has also been linked to large-scale brute-forcing attacks targeting VPN and SSH services as far back as early 2024. The team from Device and Browser Info has since released a list of all IPIDEA-linked proxy exit IPs. 

🔔 Top News

  • Microsoft Patches Exploited Office Flaw — Microsoft issued out-of-band security patches for a high-severity Microsoft Office zero-day vulnerability exploited in attacks. The vulnerability, tracked as CVE-2026-21509, carries a CVSS score of 7.8 out of 10.0. It has been described as a security feature bypass in Microsoft Office. “Reliance on untrusted inputs in a security decision in Microsoft Office allows an unauthorized attacker to bypass a security feature locally,” the tech giant said in an advisory. “This update addresses a vulnerability that bypasses OLE mitigations in Microsoft 365 and Microsoft Office, which protect users from vulnerable COM/OLE controls.” Microsoft has not shared any details about the nature and the scope of attacks exploiting CVE-2026-21509.
  • Ivanti Patches Exploited EPMM Flaws — Ivanti rolled out security updates to address two security flaws impacting Ivanti Endpoint Manager Mobile (EPMM) that have been exploited in zero-day attacks. The vulnerabilities, tracked as CVE-2026-1281 and CVE-2026-1340, relate to code injection, allowing attackers to achieve unauthenticated remote code execution. “We are aware of a very limited number of customers whose solution has been exploited at the time of disclosure,” Ivanti said in an advisory, adding it does not have enough information about the threat actor tactics to provide “reliable atomic indicators.” As of January 30, 2026, a public working proof-of-concept exploit is available. “As EPMM is an endpoint management solution for mobile devices, the impact of an attacker compromising the EPMM server is significant,” Rapid7 said. “An attacker may be able to access Personally Identifiable Information (PII) regarding mobile device users, such as their names and email addresses, but also their mobile device information, such as their phone numbers, GPS information, and other sensitive unique identification information.”
  • Poland Links Cyber Attack on Power System to Static Tundra — The Polish computer emergency response team revealed that coordinated cyber attacks targeted more than 30 wind and photovoltaic farms, a private company from the manufacturing sector, and a large combined heat and power plant (CHP) supplying heat to almost half a million customers in the country. CERT Polska said the incident took place on December 29, 2025, describing the attacks as destructive. The agency attributed the attacks to a threat cluster dubbed Static Tundra, which is also tracked as Berserk Bear, Blue Kraken, Crouching Yeti, Dragonfly, Energetic Bear, Ghost Blizzard (formerly Bromine), and Havex. Static Tundra is assessed to be linked to Russia’s Federal Security Service’s (FSB) Center 16 unit. Prior reports from ESET and Dragos linked the attack with moderate confidence to a group that shares tactical overlaps with a cluster referred to as Sandworm. The group exhibits a deep understanding of electrical grid equipment and operations, strong proficiency in the industrial protocols used in power systems, and the ability to develop custom malware and wiper tools across IT and OT environments. The activity also reflects the adversary’s grasp of substation operations and the operational dependencies within electrical systems. “Taking over these devices requires capabilities beyond simply understanding their technical flaws,” Dragos said. “It requires knowledge of their specific implementation. The adversaries demonstrated this by successfully compromising RTUs at approximately 30 sites, suggesting they had mapped common configurations and operational patterns to exploit systematically.”
  • LLMJacking Campaign Targets Exposed AI Endpoints — Cybercriminals are searching for, hijacking, and monetizing exposed LLM and MCP endpoints at scale. The campaign, dubbed Operation Bizarre Bazaar, targets exposed or unprotected AI endpoints to hijack system resources, resell API access, exfiltrate data, and move laterally to internal systems. “The threat differs from traditional API abuse because compromised LLM endpoints can generate significant costs (inference is expensive), expose sensitive organizational data, and provide lateral movement opportunities,” Pillar Security said. Organizations running self-hosted LLM infrastructure (Ollama, vLLM, local AI implementations) or deploying MCP servers for AI integrations face active targeting. Common misconfigurations that are under active exploitation include Ollama running on port 11434 without authentication, OpenAI-compatible APIs on port 8000, MCP servers accessible without access controls, development/staging AI infrastructure with public IPs, and production chatbot endpoints that lack authentication or rate limits. Access to the infrastructure is advertised on a marketplace that offers access to over 30 LLMs. Called silver[.]inc, it is hosted on bulletproof infrastructure in the Netherlands, and marketed on Discord and Telegram, with payments made via cryptocurrency or PayPal.
  • Chinese Threat Actors Use PeckBirdy Framework — China-aligned threat actors have been using a cross-platform, multifunction JScript framework called PeckBirdy to conduct cyber espionage attacks since 2023, augmenting their activities with modular backdoors in two separate campaigns targeting gambling sites and government entities. The command-and-control (C2) framework, written in Microsoft’s JScript legacy language, is aimed at flexible deployment by enabling execution across multiple environments, including web browsers, MSHTA, WScript, Classic ASP, Node JS, and .NET (ScriptControl).

‎️‍🔥 Trending CVEs

New vulnerabilities surface daily, and attackers move fast. Reviewing and patching early keeps your systems resilient.

Here are this week’s most critical flaws to check first — CVE-2026-24423 (SmarterTools SmarterMail), CVE-2026-1281, CVE-2026-1340 (Ivanti Endpoint Manager Mobile), CVE-2025-40536, CVE-2025-40537, CVE-2025-40551, CVE-2025-40552, CVE-2025-40553 (SolarWinds Web Help Desk), CVE-2026-22709 (vm2), CVE-2026-1470, CVE-2026-0863 (n8n), CVE-2026-24858 (Fortinet FortiOS, FortiManager, FortiAnalyzer, FortiProxy, and FortiWeb), CVE-2026-21509 (Microsoft Office), CVE-2025-30248, CVE-2025-26465 (Western Digital), CVE-2025-56005 (PLY), CVE-2026-23864 (React Server Components), CVE-2025-14756 (TP-Link), CVE‑2026‑0755 (Google gemini-mcp-tool), CVE-2025-9142 (Check Point Harmony SASE), CVE-2026-1504 (Google Chrome), CVE-2025-12556 (IDIS IP cameras), CVE-2026-0818 (Mozilla Thunderbird), CCVE-2025-52598, CVE-2025-52599, CVE-2025-52600, CVE-2025-52601, CVE-2025-8075 (Hanwha Wisenet cameras), CVE-2025-33217, CVE-2025-33218, CVE-2025-33219, CVE-2025-33220 (NVIDIA GPU Display Drivers), CVE-2025-0921 (Iconics Suite), CVE-2025-26385 (Johnson Controls), and SRC-2025-0001, SRC-2025-0002, SRC-2025-0003, SRC-2025-0004 (Samsung MagicINFO 9 Server).

📰 Around the Cyber World

  • Exposed C2 Server Reveals BYOB Infrastructure — Cybersecurity researchers have discovered an open directory on a command-and-control (C2) server at IP address 38.255.43[.]60 on port 8081, which has been found serving malicious payloads associated with the Build Your Own Botnet (BYOB) framework. “The open directory contained a complete deployment of the BYOB post-exploitation framework, including droppers, stagers, payloads, and multiple post-exploitation modules,” Hunt.io said. “Analysis of the captured samples reveals a modular multi-stage infection chain designed to establish persistent remote access across Windows, Linux, and macOS platforms.” The first stage is a dropper that implements multiple layers of obfuscation to evade signature-based detection, while fetching and executing an intermediate loader, which performs a series of security checks of its own before deploying the main remote access trojan (RAT) payload for reconnaissance and persistence. It also comes with capabilities to escalate privileges, log keystrokes, terminate processes, harvest emails, and inspect network traffic. Additional infrastructure linked to the threat actor has been found to host cryptocurrency mining payloads, indicating a two-pronged approach to compromising endpoints with different payloads.
  • Phantom Enigma Resurfaces with New Tactics — The threat actors behind the Operation Phantom Enigma campaign, which targeted Brazilian users in order to steal bank accounts in early 2025, resurfaced with similar attacks in fall 2025. The attacks, per Positive Technologies, involve sending phishing emails bearing invoice-related themes to trick ordinary users into clicking on malicious links to download a malicious MSI installer that installs a malicious Google Chrome extension dubbed EnigmaBanker on the victim’s browser to collect credentials and transmit them to the attacker’s server. The malware is designed to execute JavaScript code that imports a malicious extension via Chrome DevTools Protocol (CDP) after launching the browser in debugging mode. On the other hand, the attacks aimed at enterprises drop an installer for legitimate remote access software like PDQ Connect, MeshAgent, ScreenConnect, or Syncro RMM. The threat actors behind the campaign are suspected to be operating out of Latin America.
  • Attackers Exploit Stolen AWS Credentials to Target AWS WorkMail — Threat actors are leveraging compromised Amazon Web Services (AWS) credentials to deploy phishing and spam infrastructure using AWS WorkMail, bypassing the anti-abuse controls normally enforced by AWS Simple Email Service (SES). “This allows the threat actor to leverage Amazon’s high sender reputation to masquerade as a valid business entity, with the ability to send email directly from victim-owned AWS infrastructure,” Rapid7 said. “Generating minimal service-attributed telemetry also makes threat actor activity difficult to distinguish from routine activity. Any organization with exposed AWS credentials and permissive Identity and Access Management (IAM) policies is potentially at risk, particularly those without guardrails or monitoring around WorkMail and SES configuration.”
  • Malicious VS Code Extension Delivers Stealer Malware — A malicious Visual Studio Code (VS Code) extension has been identified in Open VSX (“Angular-studio.ng-angular-extension”) masquerading as a tool for the Angular web development framework, but harbors functionality that’s activated when any HTML or TypeScript file is opened. It’s designed to run encrypted JavaScript responsible for fetching the next-stage payload from a URL embedded into the memo field of a Solana wallet using a technique called EtherHiding by constructing an RPC request to the Solana mainnet. The infection chain is also engineered such that execution is skipped on systems matching Russian locale indicators. “This pattern is commonly observed in malware originating from or affiliated with Russian-speaking threat actors, implemented to avoid domestic prosecution,” Secure Annex said. This architecture offers several advantages: blockchain immutability ensures configuration data persists indefinitely, and attackers can update payload URLs without modifying the published extension. The final payload deployed as part of the attack is a stealer malware that can siphon credentials from developer machines, conduct cryptocurrency theft, establish persistence, and exfiltrate the data to a server retrieved from a Google Calendar event.
  • Threat Actors Exploit Critical Adobe Commerce Flaw — Threat actors are continuing to exploit a critical flaw in Adobe Commerce and Magento Open Source platforms (CVE-2025-54236, CVSS score: 9.1) to compromise 216 websites worldwide in one campaign, and deploy web shells on Magento sites in Canada and Japan to enable persistent access in another. “While the cases are not assessed to be part of a single coordinated campaign, all incidents demonstrate that the vulnerability is being actively abused for authentication bypass, full system compromise, and, in some cases, web shell deployment and persistent access,” Oasis Security said.
  • Malicious Google Ads Leads to Stealer Malware — Sponsored ads on Google when searching for “Mac cleaner” or “clear cache macOS” are being used to redirect unsuspecting users to sketchy sites hosted on Google Docs and Medium to trick them into following ClickFix-style instructions to deliver stealer malware. In a related development, DHL-themed phishing emails containing ZIP archives are being used to launch XLoader using DLL side-loading, which then uses process hollowing techniques to load Phantom Stealer.
  • U.S. Authorities Investigated Meta Contractors’ Claims that WhatsApp Chats Aren’t Private — U.S. law enforcement has been investigating allegations by former Meta contractors that employees at the company can access WhatsApp messages, despite the company’s statements that the chat service is private and encrypted. The contractors claimed that some Meta staff had “unfettered” access to WhatsApp messages, content that should be off-limits, Bloomberg reported. The report stands in stark contrast to WhatsApp encryption foundations, which prevent third parties, including the company, from accessing the chat contents. “What these individuals claim is not possible because WhatsApp, its employees, and its contractors, cannot access people’s encrypted communications,” Meta was quoted as saying to Bloomberg. It’s worth noting that when a user reports a user or group, WhatsApp receives up to five of the last messages sent to them, along with their metadata. This is akin to taking a screenshot of the last few messages, as they are already on the device and in a decrypted state because the device has the “key” to read them. However, these allegations suggest much broader access to the platform.
  • New PyRAT Malware Spotted — A new Python-based remote access trojan (RAT) called PyRAT has been found to demonstrate cross-platform capabilities, persistent infection methods, and extensive remote access features. It supports features like system command execution, file system operations, file enumeration, file upload/download, and archive creation to facilitate bulk exfiltration of stolen data. The malware also comes fitted with self-cleanup capabilities to uninstall itself from the victim machine and wipe all persistence components. “This Python‑based RAT poses a notable risk to organizations because of its cross‑platform capability, broad functionality, and ease of deployment,” K7 Security Labs said. “Even though it is not associated with highly sophisticated threat actors, its effectiveness in real‑world attacks and observed detection rates indicate that it is actively used by cybercriminals and deserves attention.” It’s currently not known how it’s distributed.
  • New Exfil Out&Look Attack Technique Detailed — Cybersecurity researchers have discovered a new technique named Exfil Out&Look that abuses Outlook add-ins to steal data from organizations. “An add-in installed via OWA [Outlook Web Access can be abused to silently extract email data without generating audit logs or leaving any forensic footprint — a stark contrast to the behavior observed in Outlook Desktop,” Varonis said. “In organizations that rely heavily on Unified Audit Logs for detection and investigation, this blind spot can allow malicious or overly permissive add-ins to operate undetected for extended periods of time.” An attacker could exploit this behavior to trigger an add-in’s core functionality when a victim sends an email, allowing it to intercept outgoing messages and send the data to a third-party server. Following responsible disclosure to Microsoft on September 30, 2025, the company categorized the issue as low-severity with no immediate fix.
  • Exposed MongoDB Servers Exploited for Extortion Attacks — Almost half of all internet-exposed MongoDB servers have been compromised and are being held for ransom. An unidentified threat actor has targeted misconfigured instances to drop ransom notes on more than 1,400 databases demanding a Bitcoin payment to restore the data. Flare’s analysis found more than 208,500 publicly exposed MongoDB servers, out of which 100,000 expose operational information, and 3,100 could be accessed without authentication. What’s more, nearly half (95,000) of all internet-exposed MongoDB servers run older versions that are vulnerable to N-day flaws. “Threat actors demand payment in Bitcoin (often around 0.005 BTC, equivalent today to $500-600 USD) to a specified wallet address, promising to restore the data,” the cybersecurity company said. “However, there is no guarantee the attackers have the data, or will provide a working decryption key if paid.”
  • Deep Dive into Dark Web Forums — Positive Technologies has taken a deep-dive look into modern dark web forums, noting how they are in a constant state of flux due to ramping up of law enforcement operations, even as they embrace anonymity and protection technologies like Tor, I2P, coupled with anti-bot guardrails, anti-scraping mechanisms, closed moderation, and a strict trust system to escape scrutiny and block suspicious activity. “However, the results of these interventions are rarely final: the elimination of one forum usually becomes the starting point for the emergence of a new, more sustainable and secure one,” it said. “And an important feature of such forums is the high level of development of technical means of protection. If the early generations of dark web forums were primitive web platforms that often existed in the public part of the internet, modern forums are complex distributed systems with multi-level infrastructure, APIs, moderator bots, built-in verification tools and a multi-stage access system.”
  • TA584 Campaign Drops XWorm and Tsundere Bot — A prolific initial access broker known as TA584 (aka Storm-0900) has been observed using the Tsundere Bot alongside XWorm remote access trojan to gain network access for likely follow-on ransomware attacks. The XWorm malware uses a configuration called “P0WER” to enable its execution. “In the second half of 2025, TA584 demonstrated multiple attack chain changes, including adopting ClickFix social engineering, expanded targeting to more consistently target specific geographies and languages, and recently delivering a new malware called Tsundere Bot,” Proofpoint said. The threat actor is assessed to be active since at least 2020, but has exhibited an increased operational tempo since March 2025. Organizations in North America, the U.K., Ireland, and Germany are the main targets. Emails sent by TA584 impersonate various organizations associated with healthcare and government entities, as well as leverage well-designed and believable lures to get people to engage with malicious content. These messages are sent via compromised accounts or third-party services like SendGrid and Amazon Simple Email Service (SES). “The emails usually contain unique links for each target that perform geofencing and IP filtering,” Proofpoint said. “If these checks were passed, the recipient is redirected to a landing page aligning with the lure in the email.” Early iterations of the campaign delivered macro-enabled Excel documents dubbed EtterSilent to facilitate malware installation. The end goal of the attack is to initiate a redirect chain involving third-party traffic direction systems (TDS) like Keitaro to a CAPTCHA page, followed by a ClickFix page that instructs the victim to run a PowerShell command on their system. Some of the other payloads distributed by TA584 in the past include Ursine, TA584, WARMCOOKIE, Xeno RAT, Cobalt Strike, and DCRat.
  • South Korea to Notify Citizens of Data Leaks — The South Korean government will notify citizens when their data was exposed in a security breach. The new notification system will cover confirmed breaches, but also alert people who may be involved in a data breach, even if the case has not been confirmed. These alerts will also include information on how to seek compensation for damages.
  • Details About Critical Apache bRPC Flaw — CyberArk has published details about a recently patched critical vulnerability in Apache bRPC (CVE-2025-60021, CVSS score: 9.8) that could allow an attacker to inject remote commands. The problem resides in the “/pprof/heap” profiler endpoint. “The heap profiler service /pprof/heap did not validate the user-provided extra_options parameter before incorporating it into the jeprof command line,’ CyberArk said. “Prior to the fix, extra_options was appended directly to the command string as –<user_input>. Because this command is later executed to generate the profiling output, shell special characters in attacker-controlled input could alter the executed command, resulting in command injection.” As a result, an attacker could exploit a reachable “/pprof/heap” endpoint to execute arbitrary commands with the privileges of the Apache bRPC process, resulting in remote code execution. There are about 181 publicly reachable /pprof/heap endpoints and 790 /pprof/* endpoints, although it’s not known how many of them are susceptible to this flaw.
  • Threat Actors Use New Unicode Trick to Evade Detection — Threat actors are using the Unicode character for math division (∕) instead of a standard forward slash (/) in malicious links to evade detection. “The barely noticeable difference between the divisional and forward slashes causes traditional automated security systems and filters to fail, allowing the links to bypass detection,” email security firm Barracuda said. “As a result, victims are redirected to default or random pages.”
  • China Executes 11 Members of Myanmar Scam Mafia — The Chinese government has executed 11 members of the Ming family who ran cyber scam compounds in Myanmar. The suspects were sentenced in September 2025 following their arrest in 2023. In November 2025, five members of a Myanmar crime syndicate were sentenced to death for their roles in running industrial-scale scamming compounds near the border with China. The Ming mafia’s scam operations and gambling dens brought in more than $1.4 billion between 2015 and 2023, BBC News reported, citing China’s highest court.
  • FBI Urges Organizations to Improve Cybersecurity — The U.S. Federal Bureau of Investigation (FBI) launched Operation Winter SHIELD (short for “Securing Homeland Infrastructure by Enhancing Layered Defense”), outlining ten actions which organizations should implement to improve cyber resilience. This includes adopting phishing-resistant authentication, implementing a risk-based vulnerability management program, retiring end-of-life technology, managing third-party risk, preserving security logs, maintaining offline backups, inventorying internet-facing systems and services, strengthening email authentication, reducing administrator privileges, and executing incident response plans with all stakeholders. “Winter SHIELD provides industry with a practical roadmap to better secure information technology (IT) and operational technology (OT) environments, hardening the nation’s digital infrastructure and reducing the attack surface,” the FBI said. “Our goal is simple: to move the needle on resilience across industry by helping organizations understand where adversaries are focused and what concrete steps they can take now (and build toward in the future) to make exploitation harder.”
  • Only 26% of Vulnerability Attacks Blocked by Hosts — A new study by website security firm PatchStack has revealed that a significant majority of common WordPress-specific vulnerabilities are not mitigated by hosting service providers. In a test using 30 vulnerabilities that were known to be exploited in real-world attacks, the company found that 74% of all attacks resulted in a successful site takeover. “Of the high-impact vulnerabilities, Privilege Escalation attacks were blocked only 12% of the time,” Patchstack said. “The biggest problem isn’t that hosts don’t care about vulnerability attacks – it’s that they think their existing solutions have got them covered.”
  • Cyber Attacks Became More Distributed in 2025 — Forescout’s Threat Roundup report for 2025 has found that cyber attacks became more globally distributed and cloud-enabled. “In 2025, the top 10 countries accounted for 61% of malicious traffic – a 22% decrease compared to 2024 – and a reversal of a trend observed since 2022, when that figure was 73%,” Forescout said. “In other words, attacks are more distributed and attackers are using IP addresses from less common countries more frequently.” The U.S., India, and Germany were the most targeted countries, with 59% of the attacks originating from ISP-managed IPs, 17% from business and government networks, and 24% from hosting or cloud providers. The vast majority of the attacks originated from China, Russia, and Iran. Attacks using OT protocols surged by 84%, led by Modbus. The development comes as Cisco Talos revealed that threat actors are increasingly exploiting public-facing applications, overtaking phishing in the last quarter of 2025.
  • Google Agrees to Settle Privacy Lawsuit for $68M — Google has agreed to pay $68 million to settle a class-action lawsuit alleging its voice-activated assistant illegally recorded and shared the private conversations with third parties without their consent. The case revolved around “false accepts,” where Google Assistant is said to have activated and recorded the user’s communications even in scenarios where the actual trigger word, “Ok Google,” was not used. Google has denied any wrongdoing. Apple reached a similar $95 million settlement in December 2024 over Siri recordings. Separately, Google has agreed to pay $135 million to settle a proposed class-action lawsuit that accused the company of illegally using users’ cellular data to transmit system information to its servers without the user’s knowledge or consent since November 12, 2017. As part of the settlement, Google will not transfer data without obtaining consent from Android users when they set up their phones. It will also make it easier for users to stop the transfers, and will disclose the transfers in its Google Play terms of service. The development follows a U.S. Supreme Court decision to hear a case stemming from the use of a Facebook tracking pixel to monitor the streaming habits of users of a sports website.
  • Security Flaws in Google Fast Pair protocol — More than a dozen headphone and speaker models have been found vulnerable to a new vulnerability (CVE-2025-36911, CVSS score: 7.1) in the Google Fast Pair protocol. Called WhisperPair, the attack allows threat actors to hijack a user’s accessories without user interaction. In certain scenarios, the attackers can also register as the owners of those accessories and track the movement of the real owners via the Google Find Hub. Google awarded the researchers $15,000 following responsible disclosure in August 2025. “WhisperPair enables attackers to forcibly pair a vulnerable Fast Pair accessory (e.g., wireless headphones or earbuds) with an attacker-controlled device (e.g., a laptop) without user consent,” researchers at the COSIC group of KU Leuven said. “This gives an attacker complete control over the accessory, allowing them to play audio at high volumes or record conversations using the microphone. This attack succeeds within seconds (a median of 10 seconds) at realistic ranges (tested up to 14 metres) and does not require physical access to the vulnerable device.” In related news, an information leak vulnerability (CVE-2025-13834) and a denial-of-service (DoS) vulnerability (CVE-2025-13328) have been uncovered in Xiaomi Redmi Buds versions 3 Pro through 6 Pro. “An attacker within Bluetooth radio range can send specially crafted RFCOMM protocol interactions to the device’s internal channels without prior pairing or authentication, enabling the exposure of sensitive call-related data or triggering repeatable firmware crashes,” CERT Coordination Center (CERT/CC) said.

🎥 Cybersecurity Webinars

  • Your SOC Stack Is Broken — Here’s How to Fix It Fast: Modern SOC teams are drowning in tools, alerts, and complexity. This live session with AirMDR CEO Kumar Saurabh and SACR CEO Francis Odum cuts through the noise—showing what to build, what to buy, and what to automate for real results. Learn how top teams design efficient, cost-effective SOCs that actually work. Join now to make smarter security decisions.
  • AI Is Rewriting Cloud Forensics — Learn How to Investigate Faster: Cloud investigations are getting harder as evidence disappears fast and systems change by the minute. Traditional forensics can’t keep up. Join Wiz’s experts to see how AI and context-aware forensics are transforming cloud incident response—helping teams capture the right data automatically, connect the dots faster, and uncover what really happened in minutes instead of days.
  • Build Your Quantum-Safe Defense: Get Guidance for IT Leaders: Quantum computers could soon break the encryption that protects today’s data. Hackers are already stealing encrypted information now to decrypt it later. Join this Zscaler webinar to learn how post-quantum cryptography keeps your business safe—using hybrid encryption, zero trust, and quantum-ready security tools built for the future.

🔧 Cybersecurity Tools

  • Vulnhalla: CyberArk open-sources a new tool that automates vulnerability triage by combining CodeQL analysis with AI models like GPT-4 or Gemini. It scans public code repositories, runs CodeQL queries to find potential issues, and then uses AI to decide which ones are real security flaws versus false positives. This helps developers and security teams quickly focus on genuine risks instead of wasting time sorting through noisy scan results.
  • OpenClaw: A personal AI assistant running in Cloudflare Workers, connecting to Telegram, Discord, and Slack with secure device pairing. It uses Claude via Anthropic API and optional R2 storage for persistence—showcasing how AI agents can run safely in a sandboxed, serverless Cloudflare setup.

Disclaimer: These tools are provided for research and educational use only. They are not security-audited and may cause harm if misused. Review the code, test in controlled environments, and comply with all applicable laws and policies.

Conclusion

Cybersecurity keeps moving fast. This week’s stories show how attacks, defenses, and discoveries keep shifting the balance. Staying secure now means staying alert, reacting fast, and knowing what’s changing around you.

The past few days proved that no one is too small to be a target and no system is ever fully safe. Every patch, every update, every fix counts — because threats don’t wait.

Keep learning, stay cautious, and keep your guard up. The next wave of attacks is already forming.



Source link

Why India Are The Biggest Threat To Other Teams?: Hit 1081 sixes in the last 27 months, hit a six on every 10th ball – T20 World Cup: Why India Are The Biggest Threat To Other Teams; Six-Hitting And Run Rate Strength

0

Before the T20 World Cup 2026, India has emerged as not just the favorite team but also the most aggressive, balanced and fear-inducing team. Number of sixes, run rate, 200+ scores and individual records, India is ahead of the other teams on every parameter. If the conditions are favourable, defeating India will be considered the biggest achievement of the World Cup.

T20 World Cup: Why India Are the Biggest Threat to Other Teams; Six-Hitting and Run Rate strength

t20 world cup 2026 – Photo: ANI

Expansion

The Indian team has two big goals in the upcoming T20 World Cup. First, to become the first team to defend the title and second, to become the first team to win the T20 World Cup three times. Team India, led by Suryakumar Yadav, will enter the field keeping these two goals in mind. Statistics also show that India has the strength due to which the team can be successful in defending the title.
Trending Videos


India’s performance in T20 International cricket from October 2023 till now has not only been excellent but also dominant. During this period, India won 48 matches and lost only eight. Leaving aside the Super Over, India has remained unbeaten there also by 3-0.

Its direct message is that Team India is not only winning the matches but is also controlling the matches. Australia has been the second most successful team during this period, but their record of 28 wins and 13 losses is far behind India. This difference separates India from other teams.

Access Denied

0

Access Denied You don’t have permission to access “http://hindi.gadgets360.com/apps/whatsapp-privacy-policy-case-india-supreme-court-warns-meta-cci-order-exit-india-if-you-cant-details-inside-news-10943438” on this server.

Reference #18.50200117.1774141490.d7b97c3

https://errors.edgesuite.net/18.50200117.1774141490.d7b97c3