Npav Lab
-
Read moreA Pune-based automobile parts manufacturer lost ₹2.35 crore in a man-in-the-middle cyber attack. Learn how cybercriminals impersonated an Italian firm and the steps businesses can take to protect themselves.
-
Read moreNavi Mumbai police have dismantled a cyber fraud operation involving ₹3 crore in scams. Learn how the fraudsters deceived victims with fake stock trading promises and the ongoing recovery efforts.
-
Posted: July 11, 2025Views: 44Read moreDiscover the significant rise in Android malware activity in Q2 2025, including a surge in banking trojans and sophisticated spyware threats. Learn about the latest findings from Dr.Web Security Space and how to protect your device.
-
Read moreDiscover how a new PowerShell-based ransomware variant exploits GitHub for distribution. Learn about its infection method, encryption process, and the risks it poses to users.
-
Read moreSchneider Electric has issued a security alert for multiple vulnerabilities in its EcoStruxure IT Data Center Expert software. Learn about the critical flaws, including OS Command Injection risks, and the potential impact on data security and operational continuity.
-
Read moreThe Enforcement Directorate investigates a betting app scam involving Tollywood stars like Vijay Deverakonda and Prakash Raj. Learn about the allegations, celebrity responses, and the legal implications of this high-profile case.
-
Read moreDiscover how India's Enforcement Directorate uncovered a ₹284 crore illegal betting operation linked to the "opinion trading" app Probo. Learn about the deceptive practices and foreign funding involved in this major crackdown on online gambling.
-
Read moreExplore the tragic case of Raj Leela More, a chartered accountant who took his own life after being blackmailed for ₹3 crore by individuals he met on Instagram. Learn about the emotional and financial toll of online manipulation and extortion.
-
Read moreDiscover how a new Trojan malware, developed using reinforcement learning, can consistently bypass Microsoft Defender for Endpoint. Learn about its implications for cybersecurity and the advancements in AI-driven malware development.
-
Read moreLearn about SparkKitty, a sophisticated Trojan malware targeting iOS and Android devices to steal personal photos. Discover its distribution methods and the risks it poses, particularly in Southeast Asia and China.