Npav Lab
-
A serious vulnerability in the GSMA TS.48 Generic Test Profile allows attackers to clone eSIM profiles. Learn how this flaw can be exploited and the potential risks involved.
-
A Pune-based automobile parts manufacturer lost ₹2.35 crore in a man-in-the-middle cyber attack. Learn how cybercriminals impersonated an Italian firm and the steps businesses can take to protect themselves.
-
Navi Mumbai police have dismantled a cyber fraud operation involving ₹3 crore in scams. Learn how the fraudsters deceived victims with fake stock trading promises and the ongoing recovery efforts.
-
Posted: July 11, 2025Views: 31Discover the significant rise in Android malware activity in Q2 2025, including a surge in banking trojans and sophisticated spyware threats. Learn about the latest findings from Dr.Web Security Space and how to protect your device.
-
Discover how a new PowerShell-based ransomware variant exploits GitHub for distribution. Learn about its infection method, encryption process, and the risks it poses to users.
-
Schneider Electric has issued a security alert for multiple vulnerabilities in its EcoStruxure IT Data Center Expert software. Learn about the critical flaws, including OS Command Injection risks, and the potential impact on data security and operational continuity.
-
The Enforcement Directorate investigates a betting app scam involving Tollywood stars like Vijay Deverakonda and Prakash Raj. Learn about the allegations, celebrity responses, and the legal implications of this high-profile case.
-
Discover how India's Enforcement Directorate uncovered a ₹284 crore illegal betting operation linked to the "opinion trading" app Probo. Learn about the deceptive practices and foreign funding involved in this major crackdown on online gambling.
-
Explore the tragic case of Raj Leela More, a chartered accountant who took his own life after being blackmailed for ₹3 crore by individuals he met on Instagram. Learn about the emotional and financial toll of online manipulation and extortion.
-
Discover how a new Trojan malware, developed using reinforcement learning, can consistently bypass Microsoft Defender for Endpoint. Learn about its implications for cybersecurity and the advancements in AI-driven malware development.