Npav Lab
-
Read moreHackers exploit a legitimate driver to bypass Microsoft Defender and install Akira ransomware. Learn how this vulnerability works and how to protect your PC.
-
Read moreSocket’s Threat Research Team has uncovered over 60 malicious RubyGems packages that steal social media and marketing credentials. Learn how these infostealer tools operate.
-
Read moreThe GreedyBear cybercriminal operation has stolen over $1 million in a massive cryptocurrency theft campaign using 650+ malicious tools. Learn how they exploit browser extensions and AI.
-
Read moreCybercriminals compromised corporate systems in under five minutes by exploiting QuickAssist and PowerShell scripting. Learn how social engineering facilitated this rapid breach.
-
Read moreA Florida woman was tricked out of ₹12.5 lakh ($15,000) by scammers who cloned her daughter's voice in a deepfake emergency scam. Learn about this rising threat of AI-powered voice fraud.
-
Read moreTwo critical zero-day vulnerabilities in Trend Micro Apex One (on-prem) devices, CVE-2025-54948 and CVE-2025-54987, are being exploited in the wild. Learn about their impact and mitigation strategies.
-
Read moreCybercriminals are using free trials of Endpoint Detection and Response (EDR) software to disable existing security measures. Learn about the BYOEDR attack technique and its implications.
-
Read moreA 32-year-old software engineer from Bengaluru was defrauded of ₹55.64 lakh by a cybercriminal posing as a prospective bride on a matrimonial portal. Learn how the scam unfolded.
-
Read moreSecurity researchers demonstrate how Google's Gemini AI bot can be hijacked to control smart home devices using invisible prompts. Learn about the implications for generative AI security.
-
Read moreLearn about the critical vulnerability in D-Link DNR-322L that allows code downloads without integrity checks. Discover recommended actions to secure your device.