Blogs
-
Posted: December 21, 2023Views: 31
In the vast landscape of email phishing threats, a particularly insidious tactic has emerged—one where cyber intruders cunningly impersonate the
-
Posted: December 21, 2023Views: 30This Diwali, Let’s celebrate the festival in the true sense by spreading joy and light up the world of others.
-
Attention smartphone enthusiasts, especially those using Samsung Galaxy devices! Be mindful of a recent surge in unusual hacking incidents that
-
Over the past year, a notable surge has occurred in the emergence of ten new Android banking malware families. These
-
A major hacker group has issued a warning, planning to attack Indian websites and critical systems soon. To tackle this,
-
Posted: December 01, 2023Categories: Ransomware, Features, Cyber Attack, Data Breach, Cloud Security, Cloud malware, Cloud storage, DDoSViews: 34In the dynamic landscape of cybersecurity, the Cactus ransomware has adeptly navigated through significant vulnerabilities within the Qlik Sense data
-
Posted: November 23, 2023Views: 53Suspected to be the most extensive data breach in the country’s history, sensitive information of 81.5 crore Indians linked with
-
The recently uncovered Android backdoor, named ‘Xamalicious,’ has infected approximately 338,300 devices through malicious apps on Google Play. A
-
In September, there was an unprecedented surge in ransomware activity, which came after a period of reduced activity in August,
-
Posted: October 21, 2023Views: 28ExelaStealer, a brand-new information thief, has joined an already crowded field of commercial malware meant to steal sensitive information from
-
Posted: September 27, 2023Views: 18Cybersecurity experts have identified a new cybercrime group called ShadowSyndicate, previously known as Infra Storm. This group has been active
-
In today’s digital age, children are growing up surrounded by screens and technology, opening up a world of opportunities and
-
Posted: September 11, 2023Views: 93Spyware masquerading as customized versions of Telegram has been detected on the Google Play Store. These apps have malicious functionalities
-
Posted: September 01, 2023Views: 707The recent news of hackers using OTP APIs for SMS bombing and 44 Indian APIs being exposed is a matter
-
In our increasingly interconnected world, the rapid pace of technological advancement has brought unparalleled convenience and opportunity. However,
-
In the ever-expanding realm of cyber warfare, a shadowy player has emerged: “Mysterious Team Bangladesh.” This enigmatic group has been
-
Posted: August 11, 2023Views: 500
Enjoy the greatest cyber security products this Independence Day with NPAV. On the occasion of Independence Day, NPAV remembers the braves, soldiers, and medical
-
Hackers are infecting devices with spyware malware that harvests call logs, texts, and GPS positions from phones by utilizing the
-
The nation’s official cyber security agency has issued a new advisory warning of the existence of the Internet ransomware virus
-
Posted: July 18, 2023Views: 34Microsoft is looking into a persistent Exchange Online outage that prevents users from sending emails and results in 503 errors