Parliamentarian In Hacker’s Trap

Recently parliamentarian Prem Bahadur Ale’s Facebook account was hacked. The hackers have been asking for the recharge card pin to the Ale’s close friends through his Facebook account. From last one month’s...

CSI Nepal Hosted 6th Cyber Security Awareness Program

Cyber Security International Nepal held its 6th awareness campaign at Chabahil. The students who just gave SLC examinations were the primary target group of this program. The number of participants in...

Dropbox Hacked – More Than 68 Million Account Details Leaked Online

It’s tough to believe that currently hackers have also hacked the Dropbox account and leaked more than 68 million account details on Dark Web as like LinkedIn, MySpace, VK.com and Tumblr....
Security Roadmap For Nepal

Visa Launches Payments Security Roadmap For Nepal

11th Sept 2020, Kathmandu Visa, the global payments technology company, launched a new roadmap that sets the direction for payment security in Nepal for 2021and beyond. Today, as people prefer making payments...

New MySQL Zero Days Exploits To Hack Databases

It’s tough to find a single day; the hacking issues did not hear. Every day we face many cyber crime-related problems and solving those had become a tough task. This time...
LogPoint Webinar

The Anatomy and Diagnosis of Ransomware – LogPoint Webinar

6th March 2022, Kathmandu Successful ransomware attacks are reported almost daily. This is not surprising, as the threat posed by ransomware is growing steadily. For a long time now, the targets of these...

Why Your Organization Need A Customer Identity Management ?

The Identity Access Management(IAM) System is a framework for business procedures that maintain the management of electronic information identities. This framework contains the technologies that are needed to support identity management. The...
Ransomware Hackers

Ransomware Phishing Emails Sneak Through SEGs

20th November 2021, Kathmandu Secure Email Getaway, also known as SEG, measures aren't always adequate to keep phishing emails from infecting employees with ransomware, especially if the cybercriminals are leveraging genuine cloud...

Affects 80% Of Android Devices By Internet Traffic Hijacking Linux Flaw

Hackers are everywhere. They are just searching a right time and right place to hijack your personals detail. So be aware of it. And not try to provide any detail information...

Fine Of 170 Million Demanded In Call Bypass Case

A complaint has been filed in Chitwan District Court, with the demand of great worth 170 million for bypassing the call.   The police have apprehended three Nepali people who were collaborating...

Hackers Attacked High Profile Instagram For Ransom In A Recent Campaign

From last few time back many social media have been experiencing threats and attacks from the hackers. Just recently hacktivist exposed the data of nearly 50 million Facebook users. Last year...
cybersecurity career path

Career Path in Cyber Security Webinar Successfully Conducted

22nd May 2021, Kathmandu A one-day event was organized virtually by npCert, CSRI Nepal in association with Texas College of Management and IT with the title 'Career Path in Cyber Security on...

261,000 Customers Of Atlas Quantum Suffered After Major Data Theft

Recently, Cryptocurrency trading platform Atlas Quantum stated on its Facebook page that it had suffered a significant data theft that compromised personal details of around 261,000 of its customers. SC Media reported that...
Cloudstar Disrupts

Ransomware Incident at Cloudstar Disrupts the Real Estate

21 July 2021, Kathmandu A highly sophisticated ransomware incident at Cloudstar disrupts real estate. A highly sophisticated ransomware attack at Cloudstar, a cloud hosting service and managed service provider for varied real...
Chinese Cyber-espionage

Behind the Great Firewall: Chinese Cyber-espionage Adapts

19th April 2021, Kathmandu Behind the Great Firewall: Chinese cyber-espionage adapts to the post-Covid world with stealthier attacks Threat intelligence experts quizzed by The Daily Swig said that Chinese state-sponsored attackers are at the forefront of developing...

Ujjwal Gautam Rewarded with $7500 from Facebook For Finding a Bug

24th November 2021, Kathmandu Cybersecurity team member of One Cover Private Limited Ujjwal Gautam was rewarded with $7500 from Facebook for finding a bug that could allow a malicious attacker to disclose...
Digital Forensics Career

6 Fundamental Skills Required Pursuing a Career in Digital Forensics

22nd September 2021, Kathmandu Digital forensics is a better career path to grow in 2021 and beyond. The cybercriminal's malicious activities are giving trouble to the digital forensics specialists. Attackers these days...

Why Information Security Advisory Board (ISAB) ?

The secretary of the Information Security Advisory Board (ISAB) gives the department an independent idea and suggestions on all the factors of information security standards, requirements, guidelines, and practices. The Information Security...
hack-proof Computer

Ever thought of a hack-proof Computer? Some Researchers Are Working

22nd May 2021, Kathmandu Computer security is becoming increasingly significant due to the increased reliance on computer systems, the Internet, and wireless networks. Ever thought of a hack-proof computer? Some researchers are working...

Best Hacking Tricks And Tips For Android

Android is one of the most cooling devices having lots of unique cool features that let you be more mobile friendly. Besides, there is also a stock of unique tips and...
HackerOne Hits $100 Million in Bounties, Hacking for a Better World

HackerOne Hits $100 Million in Bounties, Hacking for a Better World

May 28, 2020, Kathmandu Hacking for a better world, HackerOne recently reached $100 Million in lifetime bounties since its foundation. In a blog post, they thanked everyone along the journey including their...

Preventing And Recovering From Cyber Crime: Cyber Awareness

The Cyber Security Awareness Program conducted by the Cyber Security International (CSI) Nepal on 15th June, Wednesday at Prime College was fruitful. It provided students with a kind of alertness and...
Risky Links Contain Malware

Reports Suggest 1 in 5 Risky Links Contain Malware

3rd July 2020, Kathmandu Malware is pretty much everywhere these days. It’s in mobile applications, websites, or our emails. In fact, threat actors are targeting remote workers across the globe by redirecting...
Facebook data leak

Facebook data leak: A Fresh Phone Number Database is there online, claims report

16th April 2021,  Kathmandu The news of the Facebook data leak that compromised the phone numbers and email IDs of over 500 million users has not even died yet and now there is another...

How To Find Fake Facebook Accounts ? Bhaskar Bhatt

How to identify a fake user account on the Facebook following are some tips: 1. The statement was made recently 2015, 2016. 2. The report has no history published for earlier years, but...

2018 Checkpoint Threat Report, The Future of Cyber Security

Check Point Infinity architecture delivers consolidated Gen V cybersecurity across networks, cloud, and mobile environments. Download 2018 Security Threat Report - CHECKPOINT

Conducting A Security Audit: An Introductory Overview Of CISA

I guess you may hear about CISA, Certified Information System Auditor. If not, nothing to worry about, this article would be helpful for you to know all about CISA in Detail. Certified...
Kaspersky Training in Madan Bhandari College

Enhance Your Information Security Skills at Kaspersky Training in Madan Bhandari College

8th June 2023, Kathmandu We are excited to announce that there will be an information security training session conducted by Kaspersky on June 9th, 2023. The training will take place at Madan...
Facebook rewards

Youngster From Bharatpur Discover Facebook’s Weakness, Got Reward of USD 3125

21st June 2021, Kathmandu Youngster From Bharatpur Discover Facebook's Weakness: Got Reward of USD 3125 A young boy Samip Aryal from Bharatpur finds the bug/weakness of Facebook. He is awarded a prize of...
7 Ways Hackers And Scammers Are Exploiting COVID-19 Panic

7 Ways Hackers And Scammers Are Exploiting COVID-19 Panic

April 10, 2020, Kathmandu, Nepal Since the outbreak of Coronavirus, hackers and scammers are leaving no attempts on exploiting the panic among people. The cyber attackers are capitalizing the fear among the...