Blogs
-
Read moreA major hacker group has issued a warning, planning to attack Indian websites and critical systems soon. To tackle this,
-
Posted: December 01, 2023Categories: Ransomware, Features, Cyber Attack, Data Breach, Cloud Security, Cloud malware, Cloud storage, DDoSViews: 146Read moreIn the dynamic landscape of cybersecurity, the Cactus ransomware has adeptly navigated through significant vulnerabilities within the Qlik Sense data
-
Posted: November 23, 2023Views: 135Read moreSuspected to be the most extensive data breach in the country’s history, sensitive information of 81.5 crore Indians linked with
-
Read moreThe recently uncovered Android backdoor, named ‘Xamalicious,’ has infected approximately 338,300 devices through malicious apps on Google Play. A
-
Read moreIn September, there was an unprecedented surge in ransomware activity, which came after a period of reduced activity in August,
-
Posted: October 21, 2023Views: 82Read moreExelaStealer, a brand-new information thief, has joined an already crowded field of commercial malware meant to steal sensitive information from
-
Posted: September 27, 2023Views: 60Read moreCybersecurity experts have identified a new cybercrime group called ShadowSyndicate, previously known as Infra Storm. This group has been active
-
Read moreIn today’s digital age, children are growing up surrounded by screens and technology, opening up a world of opportunities and
-
Posted: September 11, 2023Views: 313Read moreSpyware masquerading as customized versions of Telegram has been detected on the Google Play Store. These apps have malicious functionalities
-
Posted: September 01, 2023Views: 2485Read moreThe recent news of hackers using OTP APIs for SMS bombing and 44 Indian APIs being exposed is a matter
-
Read moreIn our increasingly interconnected world, the rapid pace of technological advancement has brought unparalleled convenience and opportunity. However,
-
Read moreIn the ever-expanding realm of cyber warfare, a shadowy player has emerged: “Mysterious Team Bangladesh.” This enigmatic group has been
-
Posted: August 11, 2023Views: 500Read more
Enjoy the greatest cyber security products this Independence Day with NPAV. On the occasion of Independence Day, NPAV remembers the braves, soldiers, and medical
-
Read moreHackers are infecting devices with spyware malware that harvests call logs, texts, and GPS positions from phones by utilizing the
-
Read moreThe nation’s official cyber security agency has issued a new advisory warning of the existence of the Internet ransomware virus
-
Posted: July 18, 2023Views: 75Read moreMicrosoft is looking into a persistent Exchange Online outage that prevents users from sending emails and results in 503 errors
-
Posted: July 07, 2023Categories: Ransomware, Security, Malware Alerts, Cyber Attack, Data Backup, Data Breach, vulnerability, HackerViews: 76Read moreWith over 1.5 million installations combined, two malicious file management apps were identified by security experts on Google Play. These
-
Posted: June 23, 2023Views: 74Read moreSecurity researchers have discovered a straightforward method to introduce malware to a Microsoft Teams-using organization, despite the application’s
-
Posted: June 20, 2023Views: 84Read moreSince April 2023, a brand-new information-stealing malware known as “Mystic Stealer” has been advertised on hacking forums and darknet markets,
-
Posted: June 16, 2023Categories: Events and News, Cyber Attack, Data Breach, Phishing, Browser Hijack, Hacker, Cloud SecurityViews: 105Read moreThe MOVEit data theft attacks have caused the Clop ransomware gang to start extorting businesses, first posting the names of