Blogs
-
Posted: December 21, 2023Views: 47Read moreThis Diwali, Let’s celebrate the festival in the true sense by spreading joy and light up the world of others.
-
Read moreAttention smartphone enthusiasts, especially those using Samsung Galaxy devices! Be mindful of a recent surge in unusual hacking incidents that
-
Read moreOver the past year, a notable surge has occurred in the emergence of ten new Android banking malware families. These
-
Read moreA major hacker group has issued a warning, planning to attack Indian websites and critical systems soon. To tackle this,
-
Posted: December 01, 2023Categories: Ransomware, Features, Cyber Attack, Data Breach, Cloud Security, Cloud malware, Cloud storage, DDoSViews: 70Read moreIn the dynamic landscape of cybersecurity, the Cactus ransomware has adeptly navigated through significant vulnerabilities within the Qlik Sense data
-
Posted: November 23, 2023Views: 113Read moreSuspected to be the most extensive data breach in the country’s history, sensitive information of 81.5 crore Indians linked with
-
Read moreThe recently uncovered Android backdoor, named ‘Xamalicious,’ has infected approximately 338,300 devices through malicious apps on Google Play. A
-
Read moreIn September, there was an unprecedented surge in ransomware activity, which came after a period of reduced activity in August,
-
Posted: October 21, 2023Views: 49Read moreExelaStealer, a brand-new information thief, has joined an already crowded field of commercial malware meant to steal sensitive information from
-
Posted: September 27, 2023Views: 41Read moreCybersecurity experts have identified a new cybercrime group called ShadowSyndicate, previously known as Infra Storm. This group has been active
-
Read moreIn today’s digital age, children are growing up surrounded by screens and technology, opening up a world of opportunities and
-
Posted: September 11, 2023Views: 165Read moreSpyware masquerading as customized versions of Telegram has been detected on the Google Play Store. These apps have malicious functionalities
-
Posted: September 01, 2023Views: 2295Read moreThe recent news of hackers using OTP APIs for SMS bombing and 44 Indian APIs being exposed is a matter
-
Read moreIn our increasingly interconnected world, the rapid pace of technological advancement has brought unparalleled convenience and opportunity. However,
-
Read moreIn the ever-expanding realm of cyber warfare, a shadowy player has emerged: “Mysterious Team Bangladesh.” This enigmatic group has been
-
Posted: August 11, 2023Views: 500Read more
Enjoy the greatest cyber security products this Independence Day with NPAV. On the occasion of Independence Day, NPAV remembers the braves, soldiers, and medical
-
Read moreHackers are infecting devices with spyware malware that harvests call logs, texts, and GPS positions from phones by utilizing the
-
Read moreThe nation’s official cyber security agency has issued a new advisory warning of the existence of the Internet ransomware virus
-
Posted: July 18, 2023Views: 53Read moreMicrosoft is looking into a persistent Exchange Online outage that prevents users from sending emails and results in 503 errors
-
Posted: July 07, 2023Categories: Ransomware, Security, Malware Alerts, Cyber Attack, Data Backup, Data Breach, vulnerability, HackerViews: 44Read moreWith over 1.5 million installations combined, two malicious file management apps were identified by security experts on Google Play. These