eLearning Official Domain Name Hijacked

eLearning Nepal: Our Company’s Official Domain Name Hijacked

15th May 2020, Kathmandu eLearning Nepal’s official domain name (http://elearning.edu.np) was hijacked as claimed by the company’s Facebook page. The company is Nepal’s leading eLearning solution provider registered at the Office of...
Detection and Response

Detection and Response Tools Increasingly Important as Cyber Claims Surge: Allianz

25th October 2023, Kathmandu Detection and response tools increasingly important as cyber claims surge: Allianz Ransomware incidents rising again as criminals use data exfiltration and supply chain attacks to maximize their leverage. Allianz's Commercial...
Russian Turla APT Group

Russian Turla APT Group Deploying Incipient Backdoor on Targeted Systems

29th September 2021, Kathmandu State-sponsored hackers affiliated with Russia are abaft an incipient series of intrusions utilizing an aforetime undocumented implant to compromise systems in the U.S., Germany, and Afghanistan. Cisco Talos attributed...
Network Intelligence Webinar

Network Intelligence Webinar – Beyond Managed Security Services

17th Feb 2021, Kathmandu Yantra and Network Intelligence alliance organized its 1st of the 3 webinars for the Nepal audience in December 2020. The 2nd in the series is titled “Beyond Managed Security...
KOA to Strengthen Cyber Bureau

Korean Government Agreement to Strengthen Cyber Bureau Nepal

December 4, 2021, Kathmandu Establishment of Cyber Bureau with Capacity Building for Nepal Police. The Nepal Police Department signed a cyber-investigation agreement to boost the cyber-security nation by constructing a cyber-security country. RoD...

Social Engineering psychological manipulation of its Types

Social engineering is a non-technical method of intrusion hackers which relies heavily on human interaction and often involves tracing people and breaking standard security procedure. It is one of the significant...
Tag Tracker Hacked

Apple Air Tag Tracker Hacked and Reprogrammed by a Security Researcher

17th May 2021, Kathmandu Apple Air Tag may have some security matters that could be exploited by hackers to modify the firmware of the device. Apple had released the Air Tag last...
Cyber Security Policy 2080

Why Are Banks Getting Threats for a Cyber Attack in Nepal?

1st January 2022, Kathmandu Cybercrime is a term that is related to the internet’s relationship to technological and electronic elements, including software, hardware, and information systems. Cyberlaw of Nepal was established on 15th...
Top Ethical Hacking Courses

Top 10 Ethical Hacking Courses to Kickstart Your Career in CyberSecurity

26th March 2024, Kathmandu Are you intrigued by the idea of becoming an ethical hacker or penetration tester (Top 10 Ethical Hacking Courses)? Delving into the world of cybersecurity offers a plethora...

Fake Apps Targeted Australian Banks: Security Firm

The fake apps on the Google Play store have targeted the customer of six banks including two of Australian’s most significant lenders by stealing their details, said Security firm. The fake...
Steganography On Data Security

Importance Of Steganography On Data Security

28th November 2022, Kathmandu Technology has evolved throughout generations. But like two sides of a coin, the pros come with cons. Are you familiar with the term ‘steganography’? The art of hiding secret...
Facebook Users Leaked Online

Stolen Data of 533 Million Facebook Users Leaked Online

11th March 2021, Kathmandu A collection of information on more than 530 million users was shared over the weekend on a hacker forum, prompting the leading social network to explain what happened...

ISPs Sell Your Data To Advertisers, But FCC Has A Plan To Protect Privacy

You might feel awful hearing that ISPs (Internet Service Providers) sell your Data to advertisers, but nothing to worry about there is also another behind like FCC (Federal Communication Commission) which...
Vianet’s Clients Data Hacked

Vianet Was Released Without any action in case of Hacking Customer Data

17th Feb 2021, Kathmandu Vianet Communications, an Internet service provider was found to be free of regulatory consumer data theft. Last year, the data of Vianet's customers was made public by hackers. Sensitive...
BRAC Bank Relies on Trend Micro Cybersecurity Solution

BRAC Bank Relies on Trend Micro’s Cybersecurity Solutions to Prevent APTs

April 09, 2020, Kathmandu, Nepal Trend Micro Inc, a global leader in cybersecurity solutions, announced that it is providing a comprehensive suite of cybersecurity solutions to BRAC Bank Ltd., a Bangladesh-based bank...

What Is Cybercrime? What Are The Major Types Of Cybercrime?

You heard the term “cybercrime.” So, what is cybercrime? What are the major types of cybercrime?. Cybercrime is a computer-oriented crime that involves a computer and also a network. Here the...

Cyber Law Of Nepal And Implementation, Dilli Sharma

The Government of Nepal had approved the Electronic Transaction Act-2063 (ETA 2063) on 8th December 2006. This document is a Cyber Law of Nepal and it has provisions document for authentication...

Android 5.0 Lollipop Is Set To Roll Out To The Sony Xperia Z3

Sony announced a brand new Xperia Z3 smartphone on September 2014 which was released the same month that comes up with an Android OS v4.4.4 (KitKat) up-gradable up to v5.0.2 (Lollipop)...
Data Protection and Privacy In Nepal

Data Privacy and Protection: The Importance of Proper Policies and Guidelines

May 8th, 2020, Kathmandu Cyberattacks or threats have proved to be a pandemic in the technology sector. There have been reports of several incidents of a data breach, phishing, spamming, etc. since...

Sensor Access Technology Nepal: Access Control Systems

The various control is the selective restriction of access to a resource or other place in the sector of information security and physical security. Login credentials and Locks are the two similar mechanisms of...
Risky Links Contain Malware

Reports Suggest 1 in 5 Risky Links Contain Malware

3rd July 2020, Kathmandu Malware is pretty much everywhere these days. It’s in mobile applications, websites, or our emails. In fact, threat actors are targeting remote workers across the globe by redirecting...
Information Security Meetup

Nepal Cybersecurity Meetup: Fostering Collaboration for Digital Resilience

24th March 2024, Kathmandu Nepal Cybersecurity Meetup concluded successfully, drawing together key stakeholders from academia, industry, and the cybersecurity community. Hosted by the Information Security Response Team Nepal (npCert) and co-organized by...
Windows 10 update history

Microsoft Released a Windows Update to Address the 0-Day Exploit

15th December 2021, Kathmandu Microsoft has released a Windows update to address the 0-Day exploit used to spread the Emotet malware. Microsoft has released Patch Tuesday upgrades to fix a number of security...
Cybersecurity Compliance

New Cyber Campaign “Armor Piercer” Targets Indian Government Officials

27th September 2021, Kathmandu Cyberattacks and malicious campaigns are increasing in a rapid way. According to research from Cisco Talos shows a cyber-campaign, tracked as Armor Piercer, targeting the government and defense...
Apple Advertisement

App Tracking Transparency the Highlight of the New Apple Advertisement

24th May 2021, Kathmandu Apple has just now uploaded a new privacy ad that highlights the App Tracking Transparency feature. The advertisement, ‘Privacy on iPhone Tracked’ title tells the story of a medium...

Phishing Attacks in the Name of NTA on Facebook

23 January 2021, Kathmandu The Nepal Telecommunications Authority (NTA) has said that the name and logo have been misused. By creating an unauthorized Facebook page in its name. The administrative body of the...
Use Of Pornography Contents By The Children

Use Of Pornography Contents By The Children: A Major Concern During The Lockdown

April 10, 2020, Kathmandu, Nepal Due to lockdown, many people are staying at their home and scrolling over the Internet. Small children whose schools are shut down are feeding over what they...

Peekaboo Zero-Day Vulnerability Permits Hacking Of Surveillance Cameras

Security cameras of IoT that represents various vendors invite opportunities for flaws. Recently, researchers have discerned a similar vulnerability that lets the hacking of surveillance cameras. By employing this “Peekaboo zero-day vulnerability”...
Pwn2Own

Pwn2Own: Zero-click Zoom Exploit Among Winners as Payout Record

17th April 2021, Kathmandu The flagship Pwn2Own live hacking event has broken new ground on two fronts after total payouts surpassed $1 million and the competition’s first-ever solo female contestant notched a...
Department of Railways Nepal

Evaluation of Railway Tender Stopped After The Bidding Was Hacked

30th August 2020, Kathmandu The website of the Public Procurement Monitoring Office (PPMO), bolpatra.gov.np, was hacked while evaluating the bids for the disputed railway construction contract. According to a notice issued by the...