Author: V Diwahar

I'm Aspiring SOC Analyst and independent Cybersecurity researcher, founder of CyberInfos.in. I analyzes cyber threats, vulnerabilities, and attacks, providing practical security insights for organizations and cybersecurity professionals worldwide.

In early 2026, the FBI began quietly investigating what it described as “suspicious activity” inside one of its internal systems used to manage surveillance and wiretap warrants. At first, it sounded like routine incident response something federal networks deal with more often than most people realize. But within days, multiple outlets confirmed something more serious. An FBI surveillance management network essentially the database used to track court-approved wiretaps and foreign intelligence surveillance warrants had been breached. This is not just another FBI cybersecurity breach. When the system that tracks who is legally being wiretapped becomes the target of hackers, the…

Read More

Cyber threats have just switched from being just an IT headache to a major national security risk – right up there with terrorism and economic espionage. The Trump Cybersecurity Executive Order 2026 is a big part of the US government’s plan to take on the global cybercrime problem, specifically the massive issue of ransomware, phishing junk and financial scams that are plaguing businesses and regular citizens. The fact that cybercrime is costing the world economy trillions every year has got governments all over the globe getting their acts together to strengthen their defences and crack down on the international networks…

Read More

The Cognizant TriZetto breach has exposed the sensitive healthcare and personal data of more than 3.4 million patients, quickly becoming one of the most consequential healthcare data breach 2026 incidents reported so far. Security analysts say the TriZetto Provider Solutions data breach highlights the growing risk posed by healthcare technology vendors that process massive volumes of protected patient data. The attack targeted systems operated by TriZetto Provider Solutions, a healthcare IT subsidiary of Cognizant. These systems sit quietly in the background of the U.S. healthcare ecosystem, powering billing workflows, eligibility verification, and insurance claims processing for providers across the country.…

Read More

Artificial intelligence is rapidly reshaping the cybersecurity landscape, and one of the most compelling shifts right now is AI-assisted penetration testing with Kali Linux. For years, penetration testing has been a hands-on craftequal parts technical skill, patience, and deep familiarity with a growing arsenal of security tools. Traditionally, penetration testers lived in the terminal. Every reconnaissance scan, enumeration attempt, or exploitation step required carefully typed commands, precise flags, and an understanding of what the tool would actually do once executed. One wrong parameter could waste hours or worse, disrupt a production system. Now something interesting is happening. Recent integrations between…

Read More

A dramatic escalation in cyber operations is unfolding alongside the military conflict between the United States, Israel, and Iran. Within hours of the February 28, 2026 airstrikes codenamed Operation Epic Fury by the U.S. and Operation Roaring Lion by Israel cybersecurity researchers began tracking a surge in Iran cyber attacks 2026 and retaliatory hacktivist activity spreading across the Middle East. The speed of the response is striking. According to threat intelligence from Radware and multiple cybersecurity firms, hacktivist groups mobilized almost immediately, launching coordinated distributed denial-of-service (DDoS) campaigns against government infrastructure, telecommunications providers, and financial institutions. In just a matter…

Read More

A newly discovered Perplexity Comet browser vulnerability is raising uncomfortable questions about how secure AI-powered browsers really are. Security researchers have demonstrated that something as routine as a Google Calendar invite can trick the Comet browser’s AI assistant into accessing sensitive files and leaking credentials. No malware download. No suspicious link. Just a meeting request. The Perplexity Comet browser vulnerability was uncovered by researchers at Zenity Labs, who showed how attackers could manipulate the browser’s agentic AI system using hidden instructions embedded inside a meeting invitation. Once those instructions are interpreted by the AI, the results can be serious:…

Read More