Explore The Ultimate Journey in Cybersecurity and Digital Forensics
27th August 2022, Kathmandu
People who work with digital forensics in information security are on the front lines of the fight against cybercrime.
People who collect, process, preserve, and analyze computer-related evidence. They...
Protect Database From Security Threats, Secure IT
The database security deals with the use of wide ranges of information security prevention to secure databases that generally include the data, the database systems, database applications or stored functions, the...
BlackMatter Ransomware Group Shuts Shop Citing Pressures from Law Enforcement
7th November 2021, Kathmandu
BlackMatter cybercriminal group reported that it is closing down tasks, referring to pressures from law authorization specialists.
Dynamic since July 2021, BlackMatter offers ransomware-as-a-administration (Raas), empowering threat actors and...
Global Cyber Attacks Originate from China. Is Beijing the Ultimate Virtual-threat Plotter?
13th April 2021, Kathmandu
30% of Global Cyber Attacks Originate from China. Is Beijing the Ultimate Virtual-threat Plotter?
China is using its state-sponsored cyber-attacks mostly as ‘cyber psyops’ to target rivals’ defense, economic...
Is DSC Helps To Regulate E-payment Gateway In Nepal ?
Is Digital Signature & Certificate (DSC) helps to regulate the e-payment gateway in Nepal?
A digital signature is a government-sanctioned unique identification code, which is used to validate digital information such as...
Cybersafety Awareness In Shashinagar Higher Secondary School Chitwan
Chitwan, Nepal, January 28, 2017 - Cyber Security International Nepal at Shashi Nagar High School Chitwan
The program has been sponsored by Krishna Prasad Regmi who is also the president of Chori...
An Effective Method For Information Security Awareness Raising
August 23- 2016 - CSI Nepal completed its 31st Cyber Security Awareness program at Unique English Boarding School, Saniarjun -6 Jhapa. The plan was conducted in the initiation of the CEO...
Cutting The Costs Of Cyber Crime, Awareness Of Cyber Security
39th Training Conducted by Cyber Security International (CSI) in Adikabi Bhanubhakta Campus, Damauli Tanahu District.
Initially, Concept of Cyber Security Awareness in Nepal has been revealed by Dr. Ramhari Subedi, who lives...
Do VA Chatbots Need Protection? : Importance of Security
23rd November 2020, Kathmandu
VA chatbots are used in various industries for different types of assistance. They work on the concept of Machine Learning and take decisions according to it. So,...
Alert – There’s a New Malware Out There Snatching Users’ Passwords
13th April 2021, Kathmandu
A previously undocumented malware downloader has been spotted in the wild in phishing attacks to deploy credential stealers and other malicious payloads.
Dubbed “Saint Bot,” the malware is said...
Babuk Ransomware Gang Ransomed, Incipient Forum Stuffed With Porn
29th July 2021, Kathmandu
A comment spammer flooded Babuk’s incipient ransomware forum with gay orgy porn GIFs and injunctively authorized $5K in bitcoin.
The Babuk ransomware gang’s incipient rebrand isn’t going so well....
National Conference On 38th Cyber Security Awareness
38th Cyber Security International Program at Spanish is Higher Secondary School, Jhapa, Nepal. Initially, Concept of Cyber Security Awareness in Nepal has been revealed by Dr. Ramhari Subedi, who lives in...
DarkSide Wanted Money, Not Disruption from Colonial Pipeline Attack
13th May 2021, Kathmandu
The colonial pipeline ransomware cyber attack forced the company to shut down operations and freeze IT systems. The FBI officially verified that DarkSide was responsible for compromising Colonial...
How To Increase App Security Through Mobile Phone Authentication ?
Mobile security also known as mobile phone security has become an essential factor day by day in mobile computing. Nowadays some personal and business information is stored on smartphones. Many business...
Google patches Chrome zero-day, eighth one in 2021
19th July 2021, Kathmandu
Eight security vulnerabilities, including a high severity zero-day flaw exploited in the wild, are inscribed by Google Chrome.
Chrome’s new version (91.0.4472.164) has been released for Windows, Mac, and...
Spam Terror in Messenger in the name of Honda, Don’t Open this Link by...
22 July 2021, Kathmandu
Japanese car and motorcycle maker Honda's 70th-anniversary greetings message link is currently being spread on Messenger. After clicking on the link, some rules are put along with the...
Russia’s Critical Sectors Under APT Group ChamelGang’s Radar
10th October 2021, Kathmandu
The assault vector of Russian state-supported progressed diligent danger (APT) assailants is stretched out across different nations. Various cybercriminal bunches from Russia have designated a few worldwide basic...
NRB’s Cyber Resilience Guidelines: Safeguarding the Payment Sector in Nepal
1st September 2023, Kathmandu
Rastra Bank's Payment Systems Department has taken a proactive step by introducing a comprehensive set of guidelines called the "NRB's Cyber Resilience Guidelines."
These guidelines are tailored to authorized...
ReSecurity, Inc. Has Signed A Strategic Partnership With Cynical Technology
April 08, 2020, Kathmandu, Nepal
ReSecurity, a information security company that delivers in-depth analysis layered on top of the most complete, exclusive sets of information from the Deep and Dark Web, declares...
Safer Internet Day 2021 is Celebrated in Nepal
28 January 2021, Kathmandu
The Safer Internet Day 2021 will be celebrated on 9 February 2021 in Nepal and over 170 countries to promote a safer internet for children and young people...
International Conference on Cyber Security
20th June 2021, Kathmandu
Cybercrime, Cyberlaw, Cyber Security is a paramount factor of the today's technology generation. In the generation of Science and technology, The security, crime, law is a paramount concern...
Microsoft Takes Control Of Fifty Domains Operated North Korean Hackers
Friday, January 3, 2019
Microsoft, a company that most of us know for its Operating systems, has recently taken control of domains used by Thallium, a hacking group from North Korea. The...
Google 50000 Warnings to Users on Government-backed Hackings
25th October 2021, Kathmandu
Google has stated that it has sent over 50,000 warnings to those whose accounts have been the target of government-backed phishing or malware attempts so far in 2021,...
Zero Trust: The Mobile Dimension
27th April 2021, Kathmandu
Hank Schless, senior security options manager at Lookout, discusses how to secure remote performing through mobile gadgets. Hank Schless, is senior security answers manager at Lookout.
Soon after embarking...
Kaspersky Cybersecurity Training Conducted Successfully at Madan Bhandari College
10th June 2023, Kathmandu
Madan Bhandari College, Nepal: A highly anticipated information security skills training session was successfully conducted at Madan Bhandari College by One Cover Private Limited, a renowned cybersecurity company...
What are Supply Chain Attacks by cybersecurity?
28th August 2021, Kathmandu
Today, a growing number of hackers are adopting sophisticated implements and techniques to assail a company’s Supply Chain Management and wreak havoc in business operations.
In today’s evolving digital...
How to Update Web Browsers for Secure Browsing
10th May 2021, Kathmandu
The World Wide Web accessing software application also known as web browsers or simply “browser” is used to access and view websites through internet. Some of well-known browsers...
ChildSafeNet Marks 5 Years of Online Safety for Children
14th June 2023, Kathmandu
ChildSafeNet, an organization dedicated to making the internet safer for children and young people, is proud to announce the successful completion of its five-year journey.
Since its unofficial inception...
How Should the Service Desk Reset Passwords?
10th May 2021, Kathmandu
Now and then, when employees forget passwords, they call the service desk to change or reset them. The help desk does other tasks too, but the average help...
New York City Law Department Hit by a Cyber-attack
10th June 2021, Kathmandu
A cyber-attack is any offensive maneuver that targets data, computers, infrastructures, computer networks, or personal computer devices. In other words, an attacker is a person or process that attempts...