In September, there was an unprecedented surge in ransomware activity, which came after a period of reduced activity in August,
Continue readingExelaStealer: A New, Affordable Cybercrime Weapon
ExelaStealer, a brand-new information thief, has joined an already crowded field of commercial malware meant to steal sensitive information from
Continue readingUnveiling the Enigma: ShadowSyndicate’s Cyber Intrigue
Cybersecurity experts have identified a new cybercrime group called ShadowSyndicate, previously known as Infra Storm. This group has been active
Continue readingNavigating the Digital Age: Understanding the Impact of Mobile Device Use on Children’s Health
In today’s digital age, children are growing up surrounded by screens and technology, opening up a world of opportunities and
Continue readingSpyware Hidden in Fake Telegram Apps on Google Play Infects Millions
Spyware masquerading as customized versions of Telegram has been detected on the Google Play Store. These apps have malicious functionalities
Continue readingHackers disclose 44 Indian APIs, utilize OTP APIs for SMS bombing
The recent news of hackers using OTP APIs for SMS bombing and 44 Indian APIs being exposed is a matter
Continue readingOver 1.1 Billion Cyberattacks Thwarted Globally in Q2 FY24
In our increasingly interconnected world, the rapid pace of technological advancement has brought unparalleled convenience and opportunity. However, it has
Continue readingThe Enigma of “Mysterious Team Bangladesh” and Their Targeted Cyber Attacks on India
In the ever-expanding realm of cyber warfare, a shadowy player has emerged: “Mysterious Team Bangladesh.” This enigmatic group has been
Continue readingNPAV salutes our country and wishes each and every one of its residents a very Happy Independence Day.
Enjoy the greatest cyber security products this Independence Day with NPAV. On the occasion of Independence Day, NPAV remembers the
Continue readingHackers steal user data from Signal and WhatsApp with a bogus Android chat software
Hackers are infecting devices with spyware malware that harvests call logs, texts, and GPS positions from phones by utilizing the
Continue reading