Blogs
-
A dangerous phishing campaign is targeting businesses that advertise on Meta platforms like Facebook and Instagram. Hackers are sending fake emails claiming that users’ ad accounts have been suspended due to policy violations. These emails trick victims into clicking malicious links that steal login credentials and grant attackers full control over their accounts.
-
Net Protector Total Security has once again proven its strength by achieving the VB100 certification in March 2025 on Windows 11. This recognition reinforces NPAV’s commitment to providing top-tier malware detection and robust cybersecurity for users worldwide.
-
A new ransomware strain named VanHelsing is actively targeting Windows systems, using advanced encryption and evasion techniques to bypass security defenses. First discovered on March 16, 2025, this ransomware is particularly affecting government, manufacturing, and pharmaceutical industries in France and the United States.
-
The Babuk2 ransomware group has been caught making false extortion demands by recycling stolen data from past cyberattacks. Instead of launching new breaches, Babuk2 is repurposing data from older incidents and pressuring victims into paying ransoms for information that has already been leaked.
-
Hackers have launched a new attack using fake hotel and travel booking websites to spread LummaStealer malware. Disguised as legitimate booking confirmation pages, these fraudulent sites trick users into running harmful commands that compromise their personal and financial information.
-
A dangerous new cyberattack method called Browser-in-the-Middle (BitM) is allowing hackers to steal user sessions within seconds—completely bypassing Multi-Factor Authentication (MFA). This technique tricks users into logging in through an attacker-controlled browser, giving hackers full access to their accounts.
-
Cybercriminals are using fake file conversion tools to infect users' devices with malware. The FBI has issued an urgent warning about free Word to PDF converters that secretly install malicious software, leading to identity theft, ransomware attacks, and data breaches.
-
Cybercriminals have developed a new malware attack that hides harmful software inside JPEG image files, allowing them to steal passwords from unsuspecting victims. By using steganography, a technique that hides data inside images, hackers can bypass security defenses and infect devices.
-
The FBI, CISA, and MS-ISAC have issued a critical alert about Medusa ransomware, a highly destructive cyber threat that is targeting key industries worldwide. With over 300 victims across healthcare, education, law, insurance, and manufacturing, Medusa ransomware is rapidly expanding its reach, using sophisticated tactics to extort businesses.
-
A new cyber threat is targeting developers and online users through AI-generated fake GitHub repositories. Attackers are using deceptive documentation and hidden malware to steal sensitive data, including login credentials, cryptocurrency wallets, and two-factor authentication (2FA) codes.
-
A Pune-based consultancy firm lost ₹1.9 crore in a whale phishing attack, where scammers pretended to be the company’s director and tricked an accounts manager into transferring funds.
-
A new ransomware strain called Ebyte is rapidly spreading across North America and Europe, encrypting critical files and demanding high ransom payments. Security experts warn that this malware is highly advanced, making data recovery nearly impossible without paying the attackers.
-
Elon Musk has alleged that a large-scale cyber-attack targeted X (formerly Twitter), causing widespread outages. While no evidence has been provided, Musk suggested that the attack may have originated from Ukraine. This raises concerns about cyber threats targeting major social media platforms.
-
Microsoft has uncovered a large-scale malware attack, named Storm-0408, that infected nearly one million devices worldwide. The attackers used malvertising on illegal streaming sites to spread malware hosted on GitHub, Discord, and Dropbox. The malware stole personal data, browser credentials, and even disabled security protections.
-
A new phishing scam is targeting YouTube creators using AI-generated deepfake videos of YouTube CEO Neal Mohan. Attackers trick creators into sharing login credentials by pretending to send a private video about monetization updates. Once hacked, accounts are used for scams and malware attacks.
-
A dangerous banking trojan named Anatsa (TeaBot) was found hiding in a File Manager and Document Reader app on Google Play. Before it was removed, the app had over 220,000 downloads and targeted users worldwide. This malware steals banking passwords, bypasses two-factor authentication (2FA), and enables hackers to transfer money from victims' accounts.
-
Cybercriminals have found a new way to trick companies into paying fake ransoms – by sending physical letters in the mail. Instead of hacking networks or deploying ransomware, fraudsters are simply claiming they have stolen sensitive data and demanding money to prevent its release.
-
A dangerous new version of the Android Remote Access Tool (RAT), called AndroRAT, is being used by hackers to steal unlock patterns, PINs, and passcodes from Android devices. Originally an open-source university project in 2012, AndroRAT has now evolved into a powerful malware that bypasses security defenses up to Android 15. This latest variant spreads through fake apps and phishing links, using advanced techniques to hijack device controls, steal biometric data, and break into locked smartphones.
-
Indian tech giant Tata Technologies, a key player in automotive and aerospace engineering, has allegedly fallen victim to a massive ransomware attack. The Hunters International ransomware group claims to have stolen 1.4 TB of sensitive data, potentially impacting major clients like Ford, McLaren, Honda, and Airbus.
-
A new phishing campaign is targeting Windows users with a deceptive technique called ClickFix, tricking victims into executing malicious PowerShell commands. The attack, active since March 2025, deploys a modified version of the Havoc command-and-control (C2) framework through SharePoint abuse, allowing attackers to take full control of compromised systems.