Author: V Diwahar

V Diwahar is a final-year B.E Cybersecurity student, independent security researcher, and founder of CyberInfos.in an - global cybersecurity analysis blog delivering technical depth, expert threat intelligence, and actionable security guidance to readers across the US, UK, Europe, Asia, and beyond. With hands-on academic and practical experience in ethical hacking, network security, malware analysis, penetration testing, vulnerability research, and digital forensics, I brings a practitioner's perspective to every article going beyond headlines to analyse what vulnerabilities and breaches actually mean, who is genuinely at risk, and what every reader should do about it right now. Every article published on CyberInfos.in is built on verified technical research CVE details cross-referenced with nvd.nist.gov, attack mechanics explained using real tools and lab environments, and expert analysis that challenges official statements when the evidence demands it. I founded CyberInfos.in with a single mission: to fill the gap between generic press-release rewrites and inaccessible technical papers delivering cybersecurity analysis that is deep enough for security professionals, clear enough for business owners, and actionable enough for everyone.

When a new browser promises smarter AI-powered features, most of us get excited. But with that innovation often comes a new kind of risk. That’s exactly what happened with the recent Perplexity Comet vulnerability, a flaw that lets attackers hide commands inside screenshots — yes, actual images — and trick the browser into doing things users never intended. This discovery feels like something straight out of a sci-fi story, but it’s very real, and it’s another reminder that we’re still figuring out the limits of AI browsers. How It All Started The issue first came to light on October 21,…

Read More

Online scams have become a daily threat for millions of people — and it’s only getting worse. Thankfully, Meta is taking the fight seriously. As part of Cybersecurity Awareness Month, the company has rolled out a new set of tools aimed at keeping Messenger and WhatsApp users safe from scammers and online fraud. These updates focus on spotting suspicious activity in real time, sending timely warnings, and giving people more control over their privacy. In short — Meta wants to make your chats a lot safer. Why Scams Are Spiraling Out of Control If you’ve ever received a strange “urgent”…

Read More

The Capita data breach has become one of the biggest cybersecurity failures in the UK in recent years. The Information Commissioner’s Office (ICO) fined the outsourcing firm £14 million after hackers gained access to the personal information of around 6.6 million people. For many, this incident wasn’t just another headline it was a wake-up call about how even major corporations can fall victim to simple mistakes that snowball into massive privacy disasters. How the Breach Happened In March 2023, an ordinary workday at Capita took a sharp turn. An employee unknowingly downloaded a malicious file to their device. That small…

Read More

If you use Visual Studio Code every day, this might make you pause for a moment. Recent research found that more than a hundred popular VS Code extensions accidentally leaked sensitive information — like access tokens — that could let hackers sneak in and spread malicious updates. This discovery highlights a growing issue with VS Code extension security risks and reminds developers just how fragile the software supply chain can be. Something as small as a forgotten key inside an extension could open the door for serious trouble. How the Discovery Happened The team at Wiz Security decided to take…

Read More

There’s a new cyber threat making the rounds on WhatsApp, and it’s nastier than usual. Security researchers have discovered a WhatsApp Worm Banking Malware that sneaks through chat messages, steals banking information, and even spreads to your friends automatically. It started in Brazil but is already being watched closely worldwide. The scary part? The attack looks completely normal until it’s too late. How the Infection Starts Everything begins with what looks like an innocent message on WhatsApp Web. You might get a note from someone you know, sharing a ZIP file and saying it must be opened on a computer.…

Read More

The Cybersecurity Newsletter Weekly brings you the most important digital threats, breaches, and security updates shaping the online world. This week, the spotlight is on the Discord data exposure, the Red Hat breach, and several critical vulnerabilities affecting top platforms like 7-Zip, Oracle, and Cisco. With cyberattacks rising, staying informed is your first defense. The purpose of this Cybersecurity Newsletter Weekly is simple — to help security professionals, businesses, and users understand the latest malware campaigns, zero-day vulnerabilities, and data breaches before they strike home. Major Threats Highlighted in the Cybersecurity Newsletter Weekly 1. WARMCOOKIE Backdoor Upgraded with Stealth Capabilities…

Read More