Author: V Diwahar

V Diwahar is a final-year B.E Cybersecurity student, independent security researcher, and founder of CyberInfos.in an - global cybersecurity analysis blog delivering technical depth, expert threat intelligence, and actionable security guidance to readers across the US, UK, Europe, Asia, and beyond. With hands-on academic and practical experience in ethical hacking, network security, malware analysis, penetration testing, vulnerability research, and digital forensics, I brings a practitioner's perspective to every article going beyond headlines to analyse what vulnerabilities and breaches actually mean, who is genuinely at risk, and what every reader should do about it right now. Every article published on CyberInfos.in is built on verified technical research CVE details cross-referenced with nvd.nist.gov, attack mechanics explained using real tools and lab environments, and expert analysis that challenges official statements when the evidence demands it. I founded CyberInfos.in with a single mission: to fill the gap between generic press-release rewrites and inaccessible technical papers delivering cybersecurity analysis that is deep enough for security professionals, clear enough for business owners, and actionable enough for everyone.

Meta is quietly preparing a shift that could change how people experience social media every day. The company plans to test Meta premium subscriptions across its biggest platforms Instagram, Facebook, and WhatsApp giving users the option to pay for smarter, AI-powered features while keeping the basics free. Rather than locking people out behind a paywall, Meta says the goal is simple: let users choose whether they want more control, better tools, and deeper AI assistance. This approach fits neatly into Meta’s growing focus on AI, especially as competition heats up with players like OpenAI and Google pushing AI into everyday…

Read More

Browser extensions have become a normal part of everyday internet use. Most users install them quickly, assuming that anything listed in an official store has already been checked and approved. Unfortunately, that sense of safety is now being exploited. A recently identified cybercrime operation known as Stanley demonstrates how malicious Chrome extensions are being used to carry out highly effective phishing campaigns directly inside the browser. Rather than relying on suspicious emails or fake links, attackers embed phishing functionality into extensions and distribute them through trusted platforms, driving a sharp increase in Chrome Web Store phishing. This shift represents a…

Read More

Microsoft is investigating a critical Windows 11 boot failure January 2026 update issue after its latest Patch Tuesday release caused widespread startup problems and system instability. The flawed update, KB5074109, impacts Windows 11 versions 25H2 and 24H2, affecting both consumers and enterprise environments. For many Windows 11 users, January’s routine security update turned into a worst-case scenario: computers that would no longer start. What should have been a standard Patch Tuesday instead resulted in black screens, endless reboots, and systems locked out of Windows entirely. This article walks through what went wrong with Microsoft’s January update, how serious the issue…

Read More

This week’s cybersecurity weekly report reveals something genuinely alarming threat actors are reverse-engineering security patches within 48 hours to weaponize them. The standout story: attackers cracked SmarterMail’s patch on January 15, understood what it fixed by January 17, and started active exploitation by January 21. That’s the new reality we’re facing. Meanwhile, Azure is bleeding critical privilege escalation flaws enabling unauthenticated attackers to move across entire tenant boundaries. On the ransomware front, Everest just took down Nissan and Ciena, stealing 900GB of data. SafePay is explicitly targeting HR departments to recruit insiders. This isn’t opportunistic anymore it’s strategic, targeted, and…

Read More

When news breaks about another massive data exposure, it is easy to feel numb. Numbers blur together, headlines repeat, and it can start to feel abstract. But the recent discovery of 149 million passwords exposed online is different, because behind every one of those records is a real person, a real account, and real potential harm. This unsecured database was uncovered by respected cybersecurity researcher Jeremiah Fowler, and it offers a stark look at how modern cybercrime quietly reaches into everyday digital life. The findings were responsibly shared with ExpressVPN, which published the report to inform and protect the public.…

Read More

A recently uncovered AiTM phishing campaign shows how modern cyberattacks are increasingly designed to look and feel like routine business activity. According to researchers at Microsoft, threat actors deliberately abused familiar collaboration tools to gain access, remain unnoticed, and eventually turn compromised accounts into launchpads for large-scale fraud. By misusing Microsoft SharePoint, attackers blended seamlessly into everyday workflows—making it extremely difficult for employees to tell the difference between legitimate work and a malicious operation. Why This AiTM Phishing Campaign Worked So Well This adversary-in-the-middle phishing attack did not rely on obvious red flags. Instead, it took advantage of habits employees…

Read More