Npav Lab
-
Read moreBeware of a new WhatsApp scam where hackers hijack accounts via fake Facebook login links and device linking. Learn how to protect your chats, contacts, and media from takeover.
-
Read moreHackers are exploiting macOS security features like Keychain, TCC, SIP, and Gatekeeper to spread malware. Learn how to detect and prevent these advanced macOS attacks.
-
Read moreBeware of fake calls from scammers posing as the Data Protection Board of India officials. Learn how to spot these frauds and protect your personal information from social engineering attacks.
-
Read moreIn August 2025, Zscaler disclosed a major Salesforce breach involving OAuth token compromise by threat group UNC6395, impacting over 700 companies worldwide. Learn how to protect your SaaS environment.
-
Read moreResearchers found 8 malicious NPM packages targeting Windows Chrome users with obfuscated code to steal passwords, credit cards, and crypto wallets. Learn more.
-
Read moreLearn about the critical Sangoma FreePBX authentication bypass vulnerability that risks remote code execution and how to protect your system.
-
Read moreDiscover how Sindoor Dropper malware uses weaponized .desktop files to infect Linux systems via spear-phishing and deploys MeshAgent RAT.
-
Read moreDiscover how AI-generated ransomware bypasses antivirus software, posing new cybersecurity risks in 2025 and challenging traditional defenses.
-
Read moreDiscover how the TamperedChef malware uses a fake PDF editor to steal login credentials and sensitive data in a widespread 2025 cyberattack.
-
Read moreDiscover PromptLock, the first AI-powered ransomware using OpenAI's gpt-oss:20b model, enabling sophisticated attacks across multiple platforms.