Npav Lab
-
Read moreA tragic story of a Delhi University student who died by suicide after losing ₹94,000 to an online scam. Explore the implications of cyber fraud and the need for digital literacy.
-
Read moreDiscover how the state-sponsored threat actor CL-STA-0969 targeted Southeast Asian telecom networks, deploying covert malware for remote access. Learn about their tactics and tools.
-
Read moreChina accuses the U.S. of cyberattacks on its defense infrastructure by exploiting a Microsoft vulnerability. Explore the implications of this escalating cyber cold war.
-
Read moreDiscover how the Pakistan-linked APT36 group is targeting Indian railways and government systems using malicious PDF files. Learn about their sophisticated infection chains and phishing tactics.
-
Read moreDiscover how phishing scams are targeting users through WhatsApp messages, including a recent HDFC Bank impersonation attempt. Learn how to protect yourself with FraudProtector.Net.
-
Read moreA series of data breaches linked to the ShinyHunters group has affected major companies like Qantas and LVMH. Learn how voice phishing techniques compromised Salesforce CRM systems and the implications for data security.
-
Read moreAnubis ransomware, first detected in November 2024, targets both Android and Windows platforms, utilizing a ransomware-as-a-service model. Learn about its tactics, high-profile attacks, and how to defend against this emerging threat.
-
Read moreThe maritime industry faces a surge in ransomware attacks from APT groups, with over 100 cyberattacks reported in the past year. Learn about the tactics used by hackers and the implications for global trade.
-
Read moreSonatype reveals a cyber infiltration campaign by the North Korea-backed Lazarus Group, targeting CI/CD pipelines with malicious packages. Learn about the implications for open-source security.
-
Read moreA cybercriminal known as Tsar0Byte claims to have breached Nokia's internal network, stealing sensitive data of over 94,500 employees. Learn about the implications and exposed information.