Blogs
-
Posted: April 17, 2025A massive cybercrime operation is targeting Indian investors with fake stock and crypto schemes. Hackers are using Telegram groups, fake mobile apps, and even compromised college websites to trick users, steal financial data, and siphon off crores in hard-earned money. With losses already crossing ₹50 crore, it's clear this is not just a scam—it’s a full-scale cyberattack.
-
Data poisoning is the new and silent evolution of ransomware that doesn’t lock your files — it changes them. From financial fraud to medical disasters, this dangerous cyberattack is designed to manipulate critical data, leaving businesses, hospitals, and governments confused, vulnerable, and unprepared.
-
A hacker identified as @303 has allegedly breached an Indian software company on December 19, 2024, leaking a massive dataset of sensitive policyholder and admin data from companies like HDFC Ergo, Bajaj Allianz, ICICI Lombard, and more. This breach adds to the growing wave of cyberattacks targeting India’s insurance industry.
-
Cybersecurity experts have uncovered a dangerous malware campaign where hackers mimic the Google Chrome install page to trick Android users into downloading a powerful spying tool called SpyNote. These fake pages look nearly identical to the real Google Play Store and are hosted on newly registered shady domains. When users fall for the trick and install the app, they unknowingly give hackers full control of their device.
-
An Indian Air Force (IAF) C-130J aircraft flying over Myanmar during the Operation Brahma relief mission was hit by a dangerous GPS-spoofing cyberattack. The attack could have misled the aircraft, but the pilots swiftly switched to an internal system to stay safe. Here's what happened and why GPS spoofing is a growing cyber threat.
-
A new email-based cyberattack tricks users into either giving away their Office365 login details or installing malware disguised as a Microsoft app. The attack uses trusted platforms like files.fm to appear legitimate and targets businesses and professionals using a double-threat strategy.
-
A dangerous new malware named GIFTEDCROOK is targeting Ukrainian government systems. Disguised in phishing emails, this malware is designed to steal sensitive browser data and exfiltrate it through Telegram, making it hard to detect. Cybersecurity experts are warning that this attack is part of a growing trend in cyber-espionage by threat actors.
-
The infamous Vidar Stealer malware has returned with a dangerous new trick—pretending to be Microsoft’s BGInfo.exe, a tool trusted by IT professionals. This new version is designed to silently steal browser cookies, stored passwords, and crypto wallet data.
-
Cybersecurity agencies including CISA and FBI have issued a warning about the growing use of a stealthy cyberattack technique called Fast Flux, used by hackers to hide malware servers, enable phishing websites, and build resilient command-and-control (C2) systems.
-
Cybersecurity researchers have discovered a dangerous new Android spyware app that uses password protection and Android overlay tricks to stay hidden and prevent uninstallation. Installed by someone with physical access, this app secretly spies on the victim while making it very hard to remove.
-
Oracle has confirmed a major data breach targeting its older Gen 1 servers, exposing sensitive authentication data, usernames, and hashed passwords. The attacker gained access using an old Java exploit and demanded a $20 million ransom.
-
Cybersecurity researchers have discovered a new Android malware, Salvador Stealer, which is designed to steal banking credentials and one-time passwords (OTPs). This malware pretends to be a legitimate banking app, tricking users into entering sensitive financial details.
-
Samsung Germany has suffered a serious data breach, with threat actors leaking 270,000 customer support tickets on hacking forums. The breach, traced back to compromised employee credentials from 2021, exposes customer names, email addresses, home addresses, order details, payment information, and tracking data—putting affected users at high risk of scams and fraud.
-
A dangerous China-linked hacking group, Earth Alux, has been conducting cyber espionage attacks on major industries across Asia-Pacific and Latin America. Using advanced malware called VARGEIT, these hackers infiltrate organizations to steal sensitive data and disrupt operations.
-
A dangerous Android banking malware named TsarBot is spreading rapidly, targeting over 750 banking, finance, cryptocurrency, and e-commerce apps worldwide. It uses fake login screens, phishing sites, and remote control techniques to steal user credentials and execute fraudulent transactions.
-
Cybercriminals have devised a new social engineering attack known as ClickFix, which abuses fake CAPTCHA verifications to trick users into installing malware, including ransomware and banking trojans like Qakbot. This attack exploits users’ trust in CAPTCHA systems, leading them to unknowingly execute malicious commands.
-
Cybersecurity researchers have discovered a dangerous phishing campaign where Pakistani APT hackers are using a fake India Post website to spread malware to Windows and Android users. The fraudulent site, hosted at postindia[.]site, tricks victims into downloading malicious files, putting their data and devices at risk.
-
A new wave of Android malware is exploiting Microsoft’s .NET MAUI framework to evade detection and steal sensitive data. Disguised as banking and social media apps, this malware tricks users into installing fake applications, harvesting their personal information, and sending it to cybercriminals.
-
A dangerous phishing campaign is targeting businesses that advertise on Meta platforms like Facebook and Instagram. Hackers are sending fake emails claiming that users’ ad accounts have been suspended due to policy violations. These emails trick victims into clicking malicious links that steal login credentials and grant attackers full control over their accounts.
-
Net Protector Total Security has once again proven its strength by achieving the VB100 certification in March 2025 on Windows 11. This recognition reinforces NPAV’s commitment to providing top-tier malware detection and robust cybersecurity for users worldwide.