3

'Beautiful blessing is coming': Athiya Shetty and KL Rahul to welcome first child in 2025; Sobhita Dhulipala, Pooja Hegde, others congratulate

Athiya and KL Rahul January 2023 at a farmhouse in Khandala, attended by their closest friends and family members. Recently, Athiya celebrated her 32nd birthday.




3

Ananya Panday wears mother's 21-year-old sea blue traditional outfit designed by Rohit Bal; pens beautiful note [Pics]

In a heartfelt tribute to the late Rohit Bal, Ananya Panday donned a 21-year-old suit designed by the iconic designer for her mother, Bhavana Pandey. Ananya's mother Bhavana commented, "It looks great on you !!!!!."




3

'Nayanthara: Beyond The Fairytale': Teaser reveals the sweetest side of the Lady Superstar

Nayanthara, Beyond the Fairytale made the audience interested in showing more than just a figure of a celebrity. Everyone will love this woman because the documentary will highlight the strength and elegance of the actress through personal stories and behind-the-scenes footage.




3

'Citadel: Honey Bunny' Review: Samantha locks lips with Varun Dhawan, their fiery HOT chemistry in spy thriller leaves fans spellbound

Citadel: Honey Bunny intertwines elements of romance, humour, and suspense, navigating between the 1990s and 2000s, highlighting the lead actors' chemistry and action sequences. Directed by Raj & DK, the series also stars Kay Kay Menon.




3

Liam Payne's Death Ruled As Accidental and Not Suicidal, 3 Accused Of Crime

There was a lot of speculation around the death of the singer and investigations were conducted in order to understand if it was a murder, accident or a suicide case




3

Varun Dhawan Talks About Being A Dad: "I'd Kill Anyone Who Harms My Daughter"

Varun Dhawan and Natasha Dalal welcomed a baby girl in June this year and the actor has very happily been discussing about fatherhood and his life after becoming a father.




3

"We all tried to avoid that clash..": Ajay Devgn on Singham Again locking horns with Bhool Bhulaiyaa 3

Ajay Devgn and Rohit Shetty have spoken about why the release date of Singham Again couldn't be changed despite clash with Bhool Bhulaiyaa 3.




3

Game Changer teaser: Kiara Advani is misfit, Ram Charan's political action saga fails to impress; fans call it 'Disaster'

Apart from the lead pair, Ram Charan and Kiara Advani, the film features SJ Suryah, Anjali, Jayaram, Naveen Chandra, Sunil, Srikanth, Samuthirakani and Nassar. While it was initially set for a Christmas 2024 release, the film was pushed to January 10, 2025.




3

Varun Dhawan's 'heart sank' when he saw Samantha use oxygen tank, collapse during Citadel: Hunny Bunny shoot

Varun Dhawan has recalled the two instances when his heart sank seeing Samantha Ruth Prabhu using oxygen, collapsing on the sets of Citadel: Hunny Bunny




3

Diljit proudly says 'Punjabi aa gaye Abu Dhabi' during his Dil-Luminati Tour

Punjabi sensation Diljit Dosanjh, who had a successful tour in India, mesmerised concert-goers in the Middle-East and was heard proudly saying "Punjabi aa gaye Abu Dhabi."




3

Malaika Arora's November challenge after split with Arjun Kapoor: No alcohol, remove toxic people

Malaika Arora has penned down some big challenges for herself for the month of November. Let's take a look.




3

'Ageing gracefully': Kareena Kapoor goes bold in bikini; captures shirtless Saif Ali Khan in Maldives

Taking to her Instagram handle, Kareena shared photos and wrote, "Saturday selfies with one thrown in of the husband." In the photos, Kareena opted for no-makeup look as she flaunted her natural beauty. Saif Ali Khan looked handsome in neon colour pants.




3

Narayan Murthy forgot his 25th wedding anniversary; Sudha doesn't cook: Couple share heartiest moments on Kapil Sharma show

On Saturday's episode co-founder of Infosys Narayana Murthy and his wife Sudha Murthy, Zomato CEO Deepinder Goyal and his wife Grecia Munoz graced the Kapil Sharma show. The couple delighted the viewers with their charming personalities and candid stories.




3

Neetu Kapoor, Riddhima groove to Bobby Deol's song Jamal Kudu from Animal; fans ask 'Where is Ranbir, Alia, Raha?'

Taking to her Instagram handle, Riddhima Kapoor shared glimpses from her Saturday night party, where she was seen dancing Jamal Kudu song, which is from Ranbir Kapoor's film. Her mother Neetu Kapoor also joined her.




3

Alia Bhatt To Star In Kalki 2898 AD Director Nag Ashwin's Next: Here's What We Know

Based on speculation, Alia Bhatt might be in talks with Nag Ashwin for a female-centric film.




3

Vaani Kapoor, Fawad Khan wrap up London Schedule of 'Abir Gulaal'

The London schedule of Indian actress Vaani Kapoor and Pakistani actor Fawad Khan's upcoming romantic comedy "Abir Gulaal" has wrapped up.




3

'Contestants are heavily humiliated or favored': Shoaib Ibrahim on declining Salman Khan-led Bigg Boss 18

Bigg Boss 18 features Shilpa Shirodkar, Arfeen Khan, Rajat Dalal, Chahat Pandey and others. Bigg Boss 18 airs on Colors TV and is also available for streaming on Jio Cinema.




3

Raveena Tandon adopts 'abandoned' German Shepherd

Bollywood actress and an ardent animal lover Raveena Tandon has a new addition to her family – a German Shepherd named Elsa, who was found abandoned on a rainy highway and later was rescued.




3

Centre rolls out 7,663 extra trains to clear festive season rush

The Railway Board has introduced another 7,663 special train services to cater to the festival season rush, from October 1 to November 30, which is a 73 per cent increase compared to the same period last year.




3

India's smaller cities drive online sales during festive season: Report

India's festive season online sales surge 49% driven by Tier-II, Tier-III cities, accounting for over 60% sales




3

Nvidia surpasses Apple to become world's largest company in AI era

Graphics chip giant Nvidia has become the world's largest company by market capitalisation, surpassing Apple, in the artificial intelligence (AI) era.




3

Make Google a 'trusted source of information' in US election: Sundar Pichai to employees

Sundar Pichai stressed to employees that Google's products must be a trusted info source for all, amid White House vote counting.




3

Adani Group stocks surge, add Rs 54,381 cr in market cap

The share price of all the companies in the Adani Group surged on Wednesday, adding Rs 54,381.06 crore worth of wealth to the investors' kitty.




3

Domestic air passenger traffic in India sees 6.3 pc growth at 138.5 lakh in Oct

The domestic air passenger traffic reached 138.5 lakh in October, higher by 6.3 per cent in comparison to 130.3 lakh in the previous month, according to a report on Thursday.




3

Tepid response to Swiggy IPO continues, 35 pc subscription on Day 2

Swiggy IPO continued to see a tepid response from investors on the second day of bidding on Thursday. The Rs 11,327 crore IPO was subscribed 0.35 times or 35 per cent on the second day.




3

LIC's new premiums surge by 22.5 pc to Rs 1.33 lakh crore in current fiscal year

Life Insurance Corporation of India (LIC), the country's largest insurer, has achieved a 22.52 per cent increase in new business premiums at Rs 1,32,680.98 crore during the first seven months of FY25, compared to the corresponding figure of Rs 1,08,289.78 crore in the same period of the previous fiscal year, data showed on Monday.




3

Trojan.Win32.MOOZ.THCCABO

Threat type: Trojan

Aliases:

Platforms: Windows

Overall Risk Rating: Low

Damage Potential: Medium

Distribution Potential: Low

Reported Infection: Low

Information Exposure: Medium

Overview:

This AutoIt-compiled malware downloads a coinminer in affected systems. This malware is distributed by cybercriminals by bundling it with a legitimate installer of the Zoom communication app.

This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.




3

Backdoor.Win32.DEVILSHADOW.THEAABO

Threat type: Backdoor

Aliases: Trojan.Win32.Scar.sydj (KASPERSKY)

Platforms: Windows

Overall Risk Rating: Low

Damage Potential: High

Distribution Potential: Low

Reported Infection: Low

Information Exposure: High

Overview:

Cybercriminals take advantage of the popularity of the Zoom messaging app. This backdoor is found in a fake Zoom installer. This is probably hosted on malicious or suspicious sites.

This Backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.

It executes commands from a remote malicious user, effectively compromising the affected system. It connects to a website to send and receive information.




3

Ransom.Win32.BABUK.THAODBA

Threat type: Ransomware

Aliases: Trojan.Win32.Udochka.kb (KASPERSKY); Trojan-Ransom.FileCrypter (IKARUS)

Platforms: Windows

Overall Risk Rating: Low

Damage Potential: High

Distribution Potential: Low

Reported Infection: Low

Information Exposure: Low

Overview:

This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.




3

Ransom.Win32.MAOLOA.THAAHBA

Threat type: Ransomware

Aliases: HEUR:Backdoor.Win32.Remcos.gen(KASPERSKY); W32/Remcos!tr.bdr(FORTINET)

Platforms: Windows

Overall Risk Rating: Low

Damage Potential: High

Distribution Potential: Low

Reported Infection: Low

Information Exposure: Low

Overview:

This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.

It drops files as ransom note. It avoids encrypting files with the following file extensions.




3

Ransom.Win32.BABUK.YEBA-THAAEBA

Threat type: Ransomware

Aliases: Ransom:Win32/BabukLocker.MK!MTB (MICROSOFT); Trojan-Ransom.FileCrypter (IKARUS)

Platforms: Windows

Overall Risk Rating: Low

Damage Potential: High

Distribution Potential: Low

Reported Infection: Low

Information Exposure: Low

Overview:

This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.




3

Ransom.Win32.DEARCRY.THCABBA

Threat type: Ransomware

Aliases: Ransom:Win32/DoejoCrypt.A (MICROSOFT)

Platforms: Windows

Overall Risk Rating: Low

Damage Potential: High

Distribution Potential: Low

Reported Infection: Low

Information Exposure: Low

Overview:

This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.




3

Ransom.Win32.ASTROLOCKER.A

Threat type: Ransomware

Aliases: BScope.TrojanRansom.Encoder (VBA32)

Platforms: Windows

Overall Risk Rating: Low

Damage Potential: Medium

Distribution Potential: Low

Reported Infection: Low

Information Exposure: Low

Overview:

This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.

It executes then deletes itself afterward.

It drops files as ransom note. It avoids encrypting files with the following file extensions.




3

Trojan.Win32.CVE20188120.E

Threat type: Trojan

Aliases: Exploit:Win32/CVE-2018-8120.A (MICROSOFT)

Platforms: Windows

Overall Risk Rating: Low

Damage Potential: High

Distribution Potential: Low

Reported Infection: Low

Information Exposure: Low

Overview:

This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.

It takes advantage of certain vulnerabilities.




3

Trojan.Win32.CVE20190808.A

Threat type: Trojan

Aliases: Win32:CVE-2019-0808-K [Expl] (AVAST)

Platforms: Windows

Overall Risk Rating: Low

Damage Potential: High

Distribution Potential: Low

Reported Infection: Low

Information Exposure: Low

Overview:

This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.

It takes advantage of certain vulnerabilities.




3

Ransom.Win32.SODINOKIBI.YABGC

Threat type: Ransomware

Aliases: N/A

Platforms: Windows

Overall Risk Rating: Low

Damage Potential: High

Distribution Potential: Low

Reported Infection: Low

Information Exposure: Medium

Overview:

This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be dropped by other malware.

It drops files as ransom note. It avoids encrypting files with the following file extensions.




3

Ransom.Win32.BLACKMATTER.THGOCBA

Threat type: Ransomware

Aliases: Trojan-Ransom.BlackMatter (IKARUS)

Platforms: Windows

Overall Risk Rating: Low

Damage Potential: High

Distribution Potential: Low

Reported Infection: Low

Information Exposure: Medium

Overview:

This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.

It drops files as ransom note. It avoids encrypting files with the following file extensions.




3

Ransom.Win32.LOCKBIT.YEBGW

Threat type: Ransomware

Aliases: Ransom:Win32/Lockbit.AA!MTB (MICROSOFT); W32/Lockbit.C2F8!tr.ransom (FORTINET)

Platforms: Windows

Overall Risk Rating: Low

Damage Potential: High

Distribution Potential: Low

Reported Infection: Low

Information Exposure: Low

Overview:

This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.

It drops files as ransom note. It avoids encrypting files with the following file extensions.




3

Trojan.Win32.WHISPERGATE.YXCAX

Threat type: Trojan

Aliases: DoS:Win32/WhisperGate.M (MICROSOFT)

Platforms: Windows

Overall Risk Rating: Low

Damage Potential: High

Distribution Potential: Low

Reported Infection: Low

Information Exposure: Low

Overview:

This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.

It executes then deletes itself afterward.




3

Trojan.Win32.KILLMBR.YECCA

Threat type: Trojan

Aliases: Win32/KillMBR.NHQ trojan (NOD32)

Platforms: Windows

Overall Risk Rating: Low

Damage Potential: High

Distribution Potential: Low

Reported Infection: Low

Information Exposure: Low

Overview:

This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.




3

Worm.Win32.HERMWIZ.YECCA

Threat type: Worm

Aliases: DoS:Win32/FoxBlade.A!dha (MICROSOFT); Win32/Agent.OJC worm (NOD32)

Platforms: Windows

Overall Risk Rating: Low

Damage Potential: Medium

Distribution Potential: High

Reported Infection: Low

Information Exposure: Low

Overview:

This Worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.




3

Ransom.Win32.LOCKBIT.YXCGD

Threat type: Ransomware

Aliases: Trojan-Ransom.BlackMatter(IKARUS), Ransom:Win32/Lockbit.STB(MICROSOFT)

Platforms: Windows

Overall Risk Rating: Low

Damage Potential: Medium

Distribution Potential: Low

Reported Infection: Low

Information Exposure: Low

Overview:

This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.

It drops files as ransom note. It avoids encrypting files with the following file extensions.




3

Ransom.Win32.RTMCOMMAND.THKBFBD

Threat type: Ransomware

Aliases: Ransom:Win32/RTMLocker.AA!MTB

Platforms: Windows

Overall Risk Rating: Low

Damage Potential: Medium

Distribution Potential: Low

Reported Infection: Low

Information Exposure: Low

Overview:

This ransomware encrypts all drives except the CD-ROM.

This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.

It drops files as ransom note.




3

Ransom.Win32.CRYPTOLOCK.E

Threat type: Ransomware

Aliases: Trojan-Ransom.FileCrypter (IKARUS)

Platforms: Windows

Overall Risk Rating: Low

Damage Potential: Medium

Distribution Potential: Low

Reported Infection: Low

Information Exposure: Low

Overview:

This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.

It terminates itself if it detects it is being run in a virtual environment.




3

Ransom.Win32.LOCKBIT.EOD

Threat type: Ransomware

Aliases:

Platforms: Windows

Overall Risk Rating: Low

Damage Potential: Medium

Distribution Potential: Low

Reported Infection: Low

Information Exposure: Low

Overview:

This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.

It drops files as ransom note. It avoids encrypting files with the following file extensions.




3

Ransom.Win32.NOKO.YPDFA

Threat type: Ransomware

Aliases:

Platforms: Windows

Overall Risk Rating: Low

Damage Potential: Medium

Distribution Potential: Low

Reported Infection: Low

Information Exposure: Low

Overview:

This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.

It drops files as ransom note. It avoids encrypting files with the following file extensions.




3

Ransom.Win32.NOKO.THDABBC

Threat type: Ransomware

Aliases: Ransom:Win32/Nokonoko.PB!MTB (MICROSOFT); Win32:Nokoyawa-A [Trj] (AVAST)

Platforms: Windows

Overall Risk Rating: Low

Damage Potential: Medium

Distribution Potential: Low

Reported Infection: Low

Information Exposure: Low

Overview:

This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.

It drops files as ransom note. It avoids encrypting files with the following file extensions.




3

Ransom.Win32.SPOOSH.THGAGBC

Threat type: Ransomware

Aliases: Generic.Ransom.DCRTR.7E80656D (BITDEFENDER)

Platforms: Windows

Overall Risk Rating: Low

Damage Potential: Medium

Distribution Potential: Low

Reported Infection: Low

Information Exposure: High

Overview:

This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.

It connects to certain websites to send and receive information.

It drops files as ransom note. It avoids encrypting files with the following file extensions.




3

J&K Assembly Adjourns Amidst Uproar Over Article 370

The J&K Assembly was adjourned following an uproar over a resolution seeking the restoration of Article 370. The BJP protested against the resolution, arguing its passing is unconstitutional and illegal.




3

Freshworks to cut its workforce by 13 pc to streamline operations

Artificial intelligence (AI) service software provider Freshworks has announced a workforce reduction of 13 per cent to streamline its operations, affecting at least 660 employees worldwide.