Npav Lab
-
Discover how the Confucius hacking group is targeting government and military entities with their advanced wooperstealer malware. Learn about their sophisticated techniques and the challenges they pose to cybersecurity.
-
Discover the SparkKitty spyware campaign targeting iOS and Android devices through official app stores. Learn about its sophisticated techniques, objectives, and the risks it poses to mobile users.
-
The NCSC has issued a warning about the UMBRELLA STAND malware targeting Fortinet FortiGate firewalls. Learn about its sophisticated techniques, persistence mechanisms, and the risks it poses to network infrastructure.
-
The Prometei botnet has resurfaced, targeting Linux servers for cryptocurrency mining and credential theft. Discover the sophisticated techniques used in this malware operation and how it poses a threat to enterprise infrastructure.
-
A newlywed couple in Pune lost ₹1.6 lakh to a fake courier scam shortly after their wedding. Learn how social engineering tactics are used in phishing schemes and how to protect yourself.
-
A new phishing campaign targeting employees uses fake TxTag toll payment notices and government domain spoofing to steal personal and financial information. Learn how to recognize and avoid this sophisticated scam.
-
Posted: June 20, 2025Views: 20The GodFather banking malware has evolved, utilizing on-device virtualization to hijack legitimate banking and cryptocurrency apps. Discover how this advanced threat operates and its implications for mobile security.
-
The FBI warns iPhone and Android users about a surge in DMV text scams, urging immediate deletion of suspicious messages. Learn how to protect yourself from these rising cyber threats.
-
Tesla's Wall Connector was hacked in an 18-minute attack during the Pwn2Own Automotive competition, exposing vulnerabilities in the charging port. Learn about the implications and security measures taken.
-
Posted: June 19, 2025Views: 14A new malware strain called SuperCard exploits hacked Android phones to steal payment card data during contactless transactions. Learn about its infection mechanism and the growing threat to mobile payment security.