Npav Lab
-
Discover how the Confucius hacking group is targeting government and military entities with their advanced wooperstealer malware. Learn about their sophisticated techniques and the challenges they pose to cybersecurity.
-
Discover the SparkKitty spyware campaign targeting iOS and Android devices through official app stores. Learn about its sophisticated techniques, objectives, and the risks it poses to mobile users.
-
The NCSC has issued a warning about the UMBRELLA STAND malware targeting Fortinet FortiGate firewalls. Learn about its sophisticated techniques, persistence mechanisms, and the risks it poses to network infrastructure.
-
The Prometei botnet has resurfaced, targeting Linux servers for cryptocurrency mining and credential theft. Discover the sophisticated techniques used in this malware operation and how it poses a threat to enterprise infrastructure.
-
A newlywed couple in Pune lost ₹1.6 lakh to a fake courier scam shortly after their wedding. Learn how social engineering tactics are used in phishing schemes and how to protect yourself.
-
A new phishing campaign targeting employees uses fake TxTag toll payment notices and government domain spoofing to steal personal and financial information. Learn how to recognize and avoid this sophisticated scam.
-
Posted: June 20, 2025Views: 7The GodFather banking malware has evolved, utilizing on-device virtualization to hijack legitimate banking and cryptocurrency apps. Discover how this advanced threat operates and its implications for mobile security.
-
The FBI warns iPhone and Android users about a surge in DMV text scams, urging immediate deletion of suspicious messages. Learn how to protect yourself from these rising cyber threats.
-
Tesla's Wall Connector was hacked in an 18-minute attack during the Pwn2Own Automotive competition, exposing vulnerabilities in the charging port. Learn about the implications and security measures taken.
-
A massive leak of 16 billion passwords from major platforms like Apple, Facebook, and Google has been uncovered. Learn how to protect your accounts and why switching to passkeys is essential.