Blogs
-
In September, there was an unprecedented surge in ransomware activity, which came after a period of reduced activity in August,
-
Posted: October 21, 2023Views: 17ExelaStealer, a brand-new information thief, has joined an already crowded field of commercial malware meant to steal sensitive information from
-
Posted: September 27, 2023Views: 7Cybersecurity experts have identified a new cybercrime group called ShadowSyndicate, previously known as Infra Storm. This group has been active
-
In today’s digital age, children are growing up surrounded by screens and technology, opening up a world of opportunities and
-
Posted: September 11, 2023Views: 24Spyware masquerading as customized versions of Telegram has been detected on the Google Play Store. These apps have malicious functionalities
-
Posted: September 01, 2023Views: 48The recent news of hackers using OTP APIs for SMS bombing and 44 Indian APIs being exposed is a matter
-
In our increasingly interconnected world, the rapid pace of technological advancement has brought unparalleled convenience and opportunity. However,
-
In the ever-expanding realm of cyber warfare, a shadowy player has emerged: “Mysterious Team Bangladesh.” This enigmatic group has been
-
Posted: August 11, 2023Views: 500
Enjoy the greatest cyber security products this Independence Day with NPAV. On the occasion of Independence Day, NPAV remembers the braves, soldiers, and medical
-
Hackers are infecting devices with spyware malware that harvests call logs, texts, and GPS positions from phones by utilizing the
-
The nation’s official cyber security agency has issued a new advisory warning of the existence of the Internet ransomware virus
-
Posted: July 18, 2023Views: 12Microsoft is looking into a persistent Exchange Online outage that prevents users from sending emails and results in 503 errors
-
Posted: July 07, 2023Categories: Ransomware, Security, Malware Alerts, Cyber Attack, Data Backup, Data Breach, vulnerability, HackerViews: 11With over 1.5 million installations combined, two malicious file management apps were identified by security experts on Google Play. These
-
Posted: June 23, 2023Views: 10Security researchers have discovered a straightforward method to introduce malware to a Microsoft Teams-using organization, despite the application’s
-
Posted: June 20, 2023Views: 12Since April 2023, a brand-new information-stealing malware known as “Mystic Stealer” has been advertised on hacking forums and darknet markets,
-
Posted: June 16, 2023Categories: Events and News, Cyber Attack, Data Breach, Phishing, Browser Hijack, Hacker, Cloud SecurityViews: 9The MOVEit data theft attacks have caused the Clop ransomware gang to start extorting businesses, first posting the names of
-
The Enlisted multiplayer first-person shooter is the target of a ransomware operation that spreads trojanized versions of the game t
-
On Tuesday, a new cyberattack attempted to target the All India Institute of Medical Sciences in Delhi was stopped. The
-
Posted: June 03, 2023Views: 14In recent months, a new and highly concerning cybersecurity threat has emerged, known as the botnet malware Horabot. This sophisticated
-
Posted: May 17, 2023Views: 6Email phishing continues to evolve as cybercriminals become more sophisticated in their tactics. One prevalent form of email phishing involves