Author: V Diwahar

V Diwahar is a final-year B.E Cybersecurity student, independent security researcher, and founder of CyberInfos.in an - global cybersecurity analysis blog delivering technical depth, expert threat intelligence, and actionable security guidance to readers across the US, UK, Europe, Asia, and beyond. With hands-on academic and practical experience in ethical hacking, network security, malware analysis, penetration testing, vulnerability research, and digital forensics, I brings a practitioner's perspective to every article going beyond headlines to analyse what vulnerabilities and breaches actually mean, who is genuinely at risk, and what every reader should do about it right now. Every article published on CyberInfos.in is built on verified technical research CVE details cross-referenced with nvd.nist.gov, attack mechanics explained using real tools and lab environments, and expert analysis that challenges official statements when the evidence demands it. I founded CyberInfos.in with a single mission: to fill the gap between generic press-release rewrites and inaccessible technical papers delivering cybersecurity analysis that is deep enough for security professionals, clear enough for business owners, and actionable enough for everyone.

When more than $100 billion in digital assets rely on smart contracts, security isn’t abstract. It’s immediate. A single overlooked bug can move markets, freeze funds, or drain liquidity in minutes. That’s the backdrop against which EVMbench arrives. EVMbench is a newly released AI blockchain security benchmark designed to evaluate how well AI systems handle AI smart contract security challenges including smart contract vulnerability detection, patch validation, and full exploit execution. Built by OpenAI in collaboration with Paradigm, the benchmark doesn’t just measure coding ability. It tests whether AI can operate responsibly inside environments where mistakes carry real financial consequences.And…

Read More

For many IT teams, backup systems are the quiet workhorses of the environment. They sit in the background, replicating virtual machines and preparing for worst-case scenarios that hopefully never arrive. But over the past 18 months, one of those trusted systems became a silent entry point.A critical Dell RecoverPoint zero-day vulnerability, tracked as CVE-2026-22769, has been exploited by a China-linked threat group since at least mid-2024.The flaw allowed attackers to authenticate using hardcoded credentials and gain full root-level control over affected appliances. From there, they deployed custom malware, established long-term persistence, and pivoted deeper into VMware infrastructure.The affected product, Dell…

Read More

CVE-2026-1731 has quickly become one of the most urgent enterprise vulnerabilities of 2026. The flaw affects BeyondTrust Remote Support (RS) and BeyondTrust Privileged Remote Access (PRA) appliances and carries a CVSS v4 score of 9.9 about as severe as it gets. Disclosed on February 6, 2026, and added to the U.S. Cybersecurity and Infrastructure Security Agency (CISA) Known Exploited Vulnerabilities (KEV) catalog just a week later, CVE-2026-1731 is not theoretical. It’s being exploited in the wild. And because it’s a pre-authentication remote code execution vulnerability, attackers don’t need credentials, MFA tokens, or user interaction to gain a foothold.For organizations that…

Read More

The UK Cyber Essentials campaign, launched on February 16, 2026, carries a message that feels both simple and urgent: if you wouldn’t leave your office unlocked overnight, don’t leave your business exposed online. Led by the UK Government, the campaign focuses on helping small and medium-sized businesses (SMEs) take practical, affordable steps to protect themselves from cyber criminals. It avoids technical overwhelm and instead promotes straightforward security habits that dramatically reduce risk. The timing matters. Cyber crime is costing UK businesses an estimated £14.7 billion annually. Half of small businesses experienced a breach or attack in the past 12 months.…

Read More

India has issued a high-level AI Impact Summit cybersecurity alert ahead of the landmark global gathering, warning that foreign threat actors may attempt to deploy deepfakes, hijack networks, plant malware, and launch ransomware attacks targeting critical infrastructure. This isn’t just routine caution. The summit will bring together world leaders, AI researchers, policymakers, and global technology stakeholders. That kind of visibility makes it a magnet for cybercriminals and state-sponsored groups looking to disrupt, embarrass, or manipulate.Officials are particularly concerned about attempts to alter speeches using deepfake technology, compromise ISP routers, and disrupt live video conferencing systems during high-profile sessions.Why does this…

Read More

The Claude artifacts ClickFix macOS infostealer campaign marks a troubling evolution in search-based malware attacks. Threat actors are now abusing public AI-generated content to trick macOS users into infecting themselves simply by copying and pasting commands into Terminal. Researchers from MacPaw’s Moonlock Lab and AdGuard have uncovered multiple malicious campaigns that leverage public artifacts hosted on Anthropic’s Claude platform. These fake guides appear in Google Search results for common macOS queries such as “Homebrew install,” “online DNS resolver,” and “macOS disk space analyzer.” At least 15,000 users reportedly viewed one of these malicious guides before it was flagged. The true…

Read More