Npav Lab
-
Cybercriminals are using free trials of Endpoint Detection and Response (EDR) software to disable existing security measures. Learn about the BYOEDR attack technique and its implications.
-
A 32-year-old software engineer from Bengaluru was defrauded of ₹55.64 lakh by a cybercriminal posing as a prospective bride on a matrimonial portal. Learn how the scam unfolded.
-
Security researchers demonstrate how Google's Gemini AI bot can be hijacked to control smart home devices using invisible prompts. Learn about the implications for generative AI security.
-
Learn about the critical vulnerability in D-Link DNR-322L that allows code downloads without integrity checks. Discover recommended actions to secure your device.
-
Discover critical pre-auth vulnerabilities in Adobe Experience Manager Forms identified by the Searchlight Cyber Research Team. Learn about the risks and recommended actions to secure your deployment.
-
In 2024, over 84,000 online gaming accounts were leaked in India, according to Kaspersky. Discover the impact of this data breach and the state of gaming security in the APAC region.
-
Posted: August 05, 2025Views: 26A Hyderabad housewife lost ₹1.61 crore to cyber scammers posing as employers. Discover how the scam unfolded and the steps taken by police to investigate.
-
Discover the critical vulnerability in Cursor IDE, known as 'CurXecute,' that enables remote code execution without user interaction. Learn about the risks and necessary updates.
-
Explore the rising threat of ransomware in India's aviation industry. Learn how digital transformation increases vulnerability and the potential impact on air travel safety and operations.
-
Discover critical vulnerabilities in NVIDIA's Triton Inference Server that allow unauthenticated attackers to execute code and take control of AI servers. Learn about the risks and necessary updates."