Npav Lab
-
Read moreA serious flaw in a major automaker's dealer portal allows hackers to unlock and start vehicles remotely. Learn about the vulnerability and its implications.
-
Posted: August 11, 2025Views: 54Read moreA DRDO employee in Hyderabad has fallen victim to a fake investment scam on WhatsApp, losing ₹54 lakh. Learn how the scam operated and the warning signs.
-
Read moreGoogle's Salesforce instance was compromised by the ShinyHunters group using voice phishing tactics. Learn about the breach and the exposed records.
-
Read moreHackers exploit a legitimate driver to bypass Microsoft Defender and install Akira ransomware. Learn how this vulnerability works and how to protect your PC.
-
Read moreSocket’s Threat Research Team has uncovered over 60 malicious RubyGems packages that steal social media and marketing credentials. Learn how these infostealer tools operate.
-
Read moreThe GreedyBear cybercriminal operation has stolen over $1 million in a massive cryptocurrency theft campaign using 650+ malicious tools. Learn how they exploit browser extensions and AI.
-
Read moreCybercriminals compromised corporate systems in under five minutes by exploiting QuickAssist and PowerShell scripting. Learn how social engineering facilitated this rapid breach.
-
Read moreA Florida woman was tricked out of ₹12.5 lakh ($15,000) by scammers who cloned her daughter's voice in a deepfake emergency scam. Learn about this rising threat of AI-powered voice fraud.
-
Read moreTwo critical zero-day vulnerabilities in Trend Micro Apex One (on-prem) devices, CVE-2025-54948 and CVE-2025-54987, are being exploited in the wild. Learn about their impact and mitigation strategies.
-
Read moreCybercriminals are using free trials of Endpoint Detection and Response (EDR) software to disable existing security measures. Learn about the BYOEDR attack technique and its implications.