Forem

Deepak Sharma profile picture

Deepak Sharma

Cybersecurity enthusiast & tech writer, uncovering global trends and innovations to inspire a safer, smarter digital world

Location Dehradun, Uttarakhand Joined Joined on  Personal website https://intelligencex.org/
AI Agents Are Creating New Cybersecurity Risks Inside Companies
Cover image for AI Agents Are Creating New Cybersecurity Risks Inside Companies

AI Agents Are Creating New Cybersecurity Risks Inside Companies

Comments
1 min read
MuddyWater Hackers Used Microsoft Teams to Steal Credentials
Cover image for MuddyWater Hackers Used Microsoft Teams to Steal Credentials

MuddyWater Hackers Used Microsoft Teams to Steal Credentials

Comments
1 min read
Mirai-Based xlabs_v1 Botnet Targets IoT Devices Through ADB Exploits
Cover image for Mirai-Based xlabs_v1 Botnet Targets IoT Devices Through ADB Exploits

Mirai-Based xlabs_v1 Botnet Targets IoT Devices Through ADB Exploits

Comments
1 min read
Critical vm2 Vulnerabilities Expose Node.js Applications to Remote Code Execution
Cover image for Critical vm2 Vulnerabilities Expose Node.js Applications to Remote Code Execution

Critical vm2 Vulnerabilities Expose Node.js Applications to Remote Code Execution

Comments
1 min read
Day-Zero Readiness Gaps Are Becoming a Major Cybersecurity Problem
Cover image for Day-Zero Readiness Gaps Are Becoming a Major Cybersecurity Problem

Day-Zero Readiness Gaps Are Becoming a Major Cybersecurity Problem

Comments
2 min read
Malicious PyPI Packages Deliver Hidden Malware on Windows and Linux
Cover image for Malicious PyPI Packages Deliver Hidden Malware on Windows and Linux

Malicious PyPI Packages Deliver Hidden Malware on Windows and Linux

Comments
1 min read
The Cyber Risks of Browser Notifications
Cover image for The Cyber Risks of Browser Notifications

The Cyber Risks of Browser Notifications

Comments
1 min read
How Hackers Use AI-Generated Voices for Fraud
Cover image for How Hackers Use AI-Generated Voices for Fraud

How Hackers Use AI-Generated Voices for Fraud

Comments
1 min read
The Hidden Threat Behind Public Telegram Groups
Cover image for The Hidden Threat Behind Public Telegram Groups

The Hidden Threat Behind Public Telegram Groups

Comments
1 min read
Why CAPTCHA Alone Cannot Stop Bots
Cover image for Why CAPTCHA Alone Cannot Stop Bots

Why CAPTCHA Alone Cannot Stop Bots

Comments
1 min read
Can Your Fitness App Leak Your Location?
Cover image for Can Your Fitness App Leak Your Location?

Can Your Fitness App Leak Your Location?

Comments
2 min read
The Security Risks of Voice Cloning Technology
Cover image for The Security Risks of Voice Cloning Technology

The Security Risks of Voice Cloning Technology

Comments
1 min read
How Hackers Exploit Expired Domains
Cover image for How Hackers Exploit Expired Domains

How Hackers Exploit Expired Domains

Comments
1 min read
The Dark Side of Free Cloud Storage
Cover image for The Dark Side of Free Cloud Storage

The Dark Side of Free Cloud Storage

Comments
1 min read
Can Your Webcam Be Turned On Remotely?
Cover image for Can Your Webcam Be Turned On Remotely?

Can Your Webcam Be Turned On Remotely?

Comments
1 min read
The Cybersecurity Problem with Smart Cars
Cover image for The Cybersecurity Problem with Smart Cars

The Cybersecurity Problem with Smart Cars

Comments
2 min read
How Fake QR Codes Are Stealing Money
Cover image for How Fake QR Codes Are Stealing Money

How Fake QR Codes Are Stealing Money

Comments
1 min read
The Hidden Risks of Browser Password Managers
Cover image for The Hidden Risks of Browser Password Managers

The Hidden Risks of Browser Password Managers

Comments
1 min read
Can Hackers Track You Through Metadata?
Cover image for Can Hackers Track You Through Metadata?

Can Hackers Track You Through Metadata?

Comments
1 min read
The Risk of Using One Email for Everything
Cover image for The Risk of Using One Email for Everything

The Risk of Using One Email for Everything

Comments
2 min read
How Hackers Exploit File Sharing Apps Like Drive & Dropbox
Cover image for How Hackers Exploit File Sharing Apps Like Drive & Dropbox

How Hackers Exploit File Sharing Apps Like Drive & Dropbox

Comments
2 min read
The Cybersecurity Danger of ‘Free Trials’ Online
Cover image for The Cybersecurity Danger of ‘Free Trials’ Online

The Cybersecurity Danger of ‘Free Trials’ Online

Comments
2 min read
Can Hackers Use Your Old SIM Card Against You?
Cover image for Can Hackers Use Your Old SIM Card Against You?

Can Hackers Use Your Old SIM Card Against You?

Comments
2 min read
The Risk of Connecting Unknown Wi-Fi Even Once
Cover image for The Risk of Connecting Unknown Wi-Fi Even Once

The Risk of Connecting Unknown Wi-Fi Even Once

Comments
1 min read
How Hackers Exploit Autofill Forms for Data Theft
Cover image for How Hackers Exploit Autofill Forms for Data Theft

How Hackers Exploit Autofill Forms for Data Theft

Comments
1 min read
The Hidden Risks of Using Shared Computers
Cover image for The Hidden Risks of Using Shared Computers

The Hidden Risks of Using Shared Computers

Comments
2 min read
Can Hackers Access Your Data Through Screen Recording Apps?
Cover image for Can Hackers Access Your Data Through Screen Recording Apps?

Can Hackers Access Your Data Through Screen Recording Apps?

Comments
1 min read
The Security Threat of Unused Installed Apps
Cover image for The Security Threat of Unused Installed Apps

The Security Threat of Unused Installed Apps

Comments
2 min read
How Hackers Use Public USB Drives to Spread Malware
Cover image for How Hackers Use Public USB Drives to Spread Malware

How Hackers Use Public USB Drives to Spread Malware

Comments
1 min read
The Cyber Risk Behind ‘Accept Terms & Conditions
Cover image for The Cyber Risk Behind ‘Accept Terms & Conditions

The Cyber Risk Behind ‘Accept Terms & Conditions

Comments
2 min read
Can Smart Assistants Record More Than You Think?
Cover image for Can Smart Assistants Record More Than You Think?

Can Smart Assistants Record More Than You Think?

Comments
1 min read
The Danger of Leaving Tabs Open for Too Long
Cover image for The Danger of Leaving Tabs Open for Too Long

The Danger of Leaving Tabs Open for Too Long

Comments
2 min read
How Hackers Exploit ‘Forgot Password’ Features
Cover image for How Hackers Exploit ‘Forgot Password’ Features

How Hackers Exploit ‘Forgot Password’ Features

Comments
2 min read
The Security Risks of Auto-Saved Cards in Browsers
Cover image for The Security Risks of Auto-Saved Cards in Browsers

The Security Risks of Auto-Saved Cards in Browsers

Comments
1 min read
Can Hackers Access Your Data Through Browser Sync?
Cover image for Can Hackers Access Your Data Through Browser Sync?

Can Hackers Access Your Data Through Browser Sync?

Comments
2 min read
The Hidden Threat Inside Free VPN Services
Cover image for The Hidden Threat Inside Free VPN Services

The Hidden Threat Inside Free VPN Services

Comments
2 min read
How Fake CAPTCHA Tests Are Used to Hack Users
Cover image for How Fake CAPTCHA Tests Are Used to Hack Users

How Fake CAPTCHA Tests Are Used to Hack Users

Comments
2 min read
The Risk of Using Public Charging Stations at Airports
Cover image for The Risk of Using Public Charging Stations at Airports

The Risk of Using Public Charging Stations at Airports

Comments
1 min read
Can Hackers Use Your Microphone Without You Knowing?
Cover image for Can Hackers Use Your Microphone Without You Knowing?

Can Hackers Use Your Microphone Without You Knowing?

Comments
1 min read
The Risk of Using the Same Device for Work and Personal Use
Cover image for The Risk of Using the Same Device for Work and Personal Use

The Risk of Using the Same Device for Work and Personal Use

Comments
2 min read
How Hackers Abuse Cloud Sharing Links
Cover image for How Hackers Abuse Cloud Sharing Links

How Hackers Abuse Cloud Sharing Links

Comments
2 min read
The Hidden Dangers of Online File Converters
Cover image for The Hidden Dangers of Online File Converters

The Hidden Dangers of Online File Converters

Comments
1 min read
Can Hackers Predict Your Password Patterns?
Cover image for Can Hackers Predict Your Password Patterns?

Can Hackers Predict Your Password Patterns?

Comments
2 min read
The Cyber Risks of Using Cracked Software
Cover image for The Cyber Risks of Using Cracked Software

The Cyber Risks of Using Cracked Software

Comments
2 min read
How Hackers Exploit ‘Remember Me’ Features
Cover image for How Hackers Exploit ‘Remember Me’ Features

How Hackers Exploit ‘Remember Me’ Features

Comments
1 min read
The Security Gap in Temporary Email Services
Cover image for The Security Gap in Temporary Email Services

The Security Gap in Temporary Email Services

Comments
2 min read
Can Hackers Access Data Through Charging Cables?
Cover image for Can Hackers Access Data Through Charging Cables?

Can Hackers Access Data Through Charging Cables?

Comments
1 min read
The Risk of Leaving Bluetooth Always On
Cover image for The Risk of Leaving Bluetooth Always On

The Risk of Leaving Bluetooth Always On

Comments
1 min read
How Hackers Use File Names to Trick You
Cover image for How Hackers Use File Names to Trick You

How Hackers Use File Names to Trick You

Comments
1 min read
The Hidden Threat Behind Free Browser Games
Cover image for The Hidden Threat Behind Free Browser Games

The Hidden Threat Behind Free Browser Games

Comments
2 min read
Can Your Keyboard Be Hacked Wirelessly?
Cover image for Can Your Keyboard Be Hacked Wirelessly?

Can Your Keyboard Be Hacked Wirelessly?

Comments
2 min read
The Cybersecurity Dangers of Screen Sharing
Cover image for The Cybersecurity Dangers of Screen Sharing

The Cybersecurity Dangers of Screen Sharing

Comments
1 min read
How Hackers Exploit Notification Pop-Ups
Cover image for How Hackers Exploit Notification Pop-Ups

How Hackers Exploit Notification Pop-Ups

Comments
2 min read
The Risk of ‘Login with Google/Facebook’ Buttons
Cover image for The Risk of ‘Login with Google/Facebook’ Buttons

The Risk of ‘Login with Google/Facebook’ Buttons

Comments
2 min read
Can Hackers Turn Your Printer Into a Spy Tool?
Cover image for Can Hackers Turn Your Printer Into a Spy Tool?

Can Hackers Turn Your Printer Into a Spy Tool?

Comments
2 min read
The Hidden Cyber Threat in QR Code Menus
Cover image for The Hidden Cyber Threat in QR Code Menus

The Hidden Cyber Threat in QR Code Menus

Comments
2 min read
How Fake Software Updates Trick Even Smart Users
Cover image for How Fake Software Updates Trick Even Smart Users

How Fake Software Updates Trick Even Smart Users

Comments
2 min read
The Security Risks of Auto-Connect Wi-Fi Features
Cover image for The Security Risks of Auto-Connect Wi-Fi Features

The Security Risks of Auto-Connect Wi-Fi Features

Comments
2 min read
Can Hackers Use Sound Waves to Steal Data?
Cover image for Can Hackers Use Sound Waves to Steal Data?

Can Hackers Use Sound Waves to Steal Data?

Comments
2 min read
The Risk of Over-Permissioned Admin Accounts
Cover image for The Risk of Over-Permissioned Admin Accounts

The Risk of Over-Permissioned Admin Accounts

Comments
2 min read
loading...