Npav Lab
- 
    Read moreDiscover how Sindoor Dropper malware uses weaponized .desktop files to infect Linux systems via spear-phishing and deploys MeshAgent RAT.
 - 
    Read moreDiscover how AI-generated ransomware bypasses antivirus software, posing new cybersecurity risks in 2025 and challenging traditional defenses.
 - 
    Read moreDiscover how the TamperedChef malware uses a fake PDF editor to steal login credentials and sensitive data in a widespread 2025 cyberattack.
 - 
    Read moreDiscover PromptLock, the first AI-powered ransomware using OpenAI's gpt-oss:20b model, enabling sophisticated attacks across multiple platforms.
 - 
    Read moreExplore how the Underground ransomware gang is enhancing tactics against global organizations, using advanced encryption and targeted attacks.
 - 
    Read moreDiscover how the Salesloft OAuth breach compromised Salesforce customer data through the Drift AI chat agent, affecting over 700 organizations.
 - 
    Posted: August 27, 2025Views: 28Read moreDiscover how fake loan apps in India are trapping users in harassment and blackmail. Learn about the global network behind these predatory practices and the ongoing regulatory challenges.
 - 
    Read moreDiscover how a malicious Go module masquerading as an SSH brute-force tool exfiltrates credentials to a Telegram bot. Learn about its key features and the threat it poses.
 - 
    Read moreZimperium’s zLabs has uncovered a new variant of the Hook Android banking trojan, featuring ransomware-style overlays and advanced credential theft tactics. Learn about its key features and technical insights.
 - 
    Read moreAdversaries are misusing AI-powered website builders like Lovable to create malicious infrastructure for malware distribution and credential phishing. Discover the emerging threats and how organizations can protect themselves.