Dr ramhari subedi

Protecting Your Digital Castle: How to Build a Secure Home Network

August 25, 2019, Kathmandu The virtual world is becoming more attractive than the physical world; the reason is, we spend most of our time on the virtual world where we can only...
WhatsApp New Privacy Policy

WhatsApp New Privacy Policy Started from 15th May

16th May 2021, Kathmandu WhatsApp Messenger is a free messaging app available for Android and smartphones which allows users to send text messages and voice messages, make a voice call, video calls,...
SOC Workshop Cybersecurity Skills

Beginner’s SOC Workshop: Elevate Your Cybersecurity Skills

8th September 2023, Kathmandu Women in Cybersecurity Nepal, in collaboration with CryptoGen Nepal (SOC Workshop Cybersecurity Skills), is delighted to unveil an exciting opportunity for all cyber enthusiasts in the region. Get ready...
Data breach in Air India

Data breach in Air India Caused Exposure of 4.5 Million Passengers Personal Information

26th May 2021, Kathmandu Data Breach on SITA passenger system service of Air India compromised the personal data of 4.5 million passengers. A decade worth of data was accessed by the attackers. Data...
Lazarus Group

North Korea’s Lazarus Group Targets IT Supply Chains with MATA Malware

31st October 2021, Kathmandu Lazarus, a famous progressed tenacious danger (APT) bunch that needs no presentation in the cyberthreat scene, hits again with improved malware types. The North Korea-upheld bunch is better known...
Global Cybersecurity Meeting

Esahar, an Online Job Search Platform for Skilled Platform

11th November 2021, Kathmandu A new online platform has been developed with the objective of making various tasks in daily life easier. Esahar.com has been started to connect both service providers and...
Britain’s Labor Party

Britain’s Labor Party Suffers Cyber Incident

8th November 2021, Kathmandu Cyberattacks and data breaches through third-party vendors keep on becoming predominant, influencing associations' basic information. England's Labor Party as of late declared that it had supported a digital episode...
Gigaset Android Phones

Gigaset Android Phones Infected By Malware By Hacked Update Server

10th April 2021, Kathmandu Gigaset, a German multinational company well known in the area of communication revealed to have a malware infection in their android phones. Owners of Gigaset android phones have...
Google Italy

Google: Italy to Contain Massive Abroad Tech Corporations in Nationwide

26th May 2021, Kathmandu Italy aims to produce a storage system for sensitive state data using cloud technology developed by big overseas firms. Its innovation minister said on Monday, following France's lead...
Australia Unveils Ransomware Action

Australia Unveils Ransomware Action Plan to Combat Cyberattacks

16th October 2021, Kathmandu With rising state-supported ransomware administrators and assaults becoming far-reaching, the Australian government has reported a Ransomware Action Plan to handle the rising cyber threats. The public authority is...
Global Cybersecurity Meeting

Attackers Actively Exploit Log4Shell Flaw in Apache Log4j

16th December 2021, Kathmandu Log4Shell, a genuine zero-day vulnerability in Apache Log4j library, uncovers knowledge into the threat actors of affiliations relying upon open-source code libraries to manufacture undertaking scale applications. The remote...

Ongoing Credential Harvesting Campaign Targets Government Agencies in APAC

24th September 2021, Kathmandu Ongoing Credential Harvesting Campaign Targets Government Agencies in APAC, EMEA Security researchers found an issue of credential harvesting campaigns targeting government agencies across seven countries in the Asia-Pacific (APAC),...
Ransomware Attacks

A Massive Ransomware Attack Has Hit More than 1,000 Companies

10th July 2021, Kathmandu According to the Cybersecurity firm huntress, more than 1,000 businesses had been stricken by ransomware attacks. Which had focused on managed service providers which give IT services primarily to...
users-dangerous-hackers

Users Can Be Just As Dangerous As Hackers

12th August 2021, Kathmandu Among the quandaries stemming from our systemic failure with cybersecurity, which ranges from decenniums-old software-development practices to Chinese and Russian cyber-attacks, one quandary gets far less attention than...
Android Trojan Purloined

Beware! This Android Trojan Purloined Many Dollars from Over 10 Million Users

30th September 2021, Kathmandu An incipiently discovered "truculent" mobile campaign has infected north of 10 million users from over 70 countries via ostensibly innocuous Android apps that subscribe the individuals to premium...
Cyber Criminals

Cybercriminals Make Twitter a Playing Field to Target Indonesian Banks

6th April 2021, Kathmandu In recent years, cyberattacks have been increasing day by day. Nowadays, Cybercriminals have placed more pressure on the financial sector. A recent study shows that 65 % of...
Ransomware Gang

Has Babuk Ransomware Gang Attempted a Slam Dunk on Houston Rockets?

22nd April 2021, Kathmandu The Houston Rockets of the National Basketball Association are investigating a cyber-attack against their networks from a relatively new ransomware group that claims to have stolen internal business data....
Apple Advertisement

App Tracking Transparency the Highlight of the New Apple Advertisement

24th May 2021, Kathmandu Apple has just now uploaded a new privacy ad that highlights the App Tracking Transparency feature. The advertisement, ‘Privacy on iPhone Tracked’ title tells the story of a medium...
webinar on owasp

OWASP’s 2021 List Shuffle: An Incipient Battle Plan and Primary Foe

22nd October 2021, Kathmandu Code injection attacks, the infamous king of susceptibilities, have lost the top spot to broken access control as the worst of the worst, and developers need to take...
Health Data Breach

Privacy Fears Around Patients’ Health Data Breach Among Covid Surge

17th May 2021, Kathmandu Sufferers are gazing at a brand new sort of privateers breach the place wellbeing knowledge can impact all their future monetary selections, by cyber safety consultants. For example, a...
Software Source Code

Three People Arrested for Misusing Software Source Code

16 March 2021, Kathmandu Police arrested three people on charges of misuse of the software source code. Among those arrested Bimal KC of Lamahi Municipality-5 of Dang, Shyam Bahadur Chaudhary of Mayadevi Municipality-5...
Cryptojacking attackers

Researchers Warned of Cryptojacking Attackers of Linux Operating

22 July 2021, Kathmandu A threat group that may be located in Romania and has been active since at least 2020 has been supporting a cryptographic hijacking campaign against Linux-based machines written...
Softwraica College Bagged Prestigious Titles

Softwraica College bagged all five prestigious titles at Threat Con’s 2023’s Capture the Flag...

19th September 2023, Kathmandu THREAT CON 2023 organized the "Capture the Flag (Softwraica College Bagged Prestigious Titles) Competition" in Nepal. Now in its fifth year, THREAT CON has firmly established itself as...
Creator of Malware

Creator of Malware Using “Exotic” Programming Language

30th July 2021, Kathmandu Threat actors are increasingly turning to "exotic" programming languages, such as Go, Rust, Nim, and Dlang, which can better circumvent traditional security protections, evade analysis, and hamper reverse...
Facebook Users Leaked Online

Stolen Data of 533 Million Facebook Users Leaked Online

11th March 2021, Kathmandu A collection of information on more than 530 million users was shared over the weekend on a hacker forum, prompting the leading social network to explain what happened...
Iran Transport Ministry

Second Cyberattack at Iran’s Transport Ministry

13th July 2021, Kathmandu Iran's Transport Ministry has affirmed that its official website was hit by a cyberattack, that led the portal page of the Ministry and its affiliated pages to go...
incident response in google cloud

Live Webinar on Preventing Attacks in Google Cloud Platform

26th February 2023, Kathmandu Get profound insights on threat hunting and incident response in Google Cloud Platform and Google Workspace infrastructure. Join our live webinar with Sygnia's IR researchers on March 1 to...
WiFi Signal Powers

“Wasted” WiFi Signal Powers Small Devices

28th May 2021, Kathmandu This article is freely split under the Attribution 4.0 International license. Researchers have developed a way to gather energy from WiFi signals to power small devices. The amount of...
Google Assistant

How Google Assisting Facebook in its Battle with Apple

October 26, 2021, Kathmandu By updating an antitrust lawsuit, Google has teamed up with Facebook to work around Apple's privacy tools in Safari to continue tracking end-users. The search engine also does...
Israeli Cyber Sabotage

Another Israeli Cyber Sabotage Attempt on Iran’s Natanz Nuclear Facility

16th April 2021, Kathmandu A nuclear facility in Iran was hit by "sabotage" a day after it unveiled new uranium enrichment equipment, the country's top nuclear official says. The internal power system at...