Applying Deep Learning for PE-Malware Classification

Credit to Author: Ajay| Date: Thu, 10 Jan 2019 08:34:28 +0000

Deep Learning & Computer vision techniques are making progress in every possible field. With growing computing powers many organizations use them to resolve or minimize many day-to-day problems. In a recent talk at AVAR 2018, Quick Heal AI team presented an approach of effectively using Deep Learning for malware classification….

Read more

Emerging trend of spreading malware through IQY files

Credit to Author: Prashant Tilekar| Date: Wed, 03 Oct 2018 10:05:14 +0000

Nowadays attackers are searching for new techniques to spread malware, recently we came across a new emerging way to deliver malware through IQY file. Till now we had seen spread of malware through various file types and chains such as Word document, Script, JAVA files. Fig 1: Attack chain IQY file…

Read more

E-commerce transactions: Tips to stay safe when shopping online

Credit to Author: Ankita Ashesh| Date: Tue, 25 Sep 2018 10:25:16 +0000

Today’s new-generation customer has all the luxuries. At the click of a button (or a touch, on a mobile phone), they can buy literally anything they want. The arrival of online marketplaces like Flipkart, Amazon and thousands of other similar websites means that the basic premise of going out of…

Read more

A massive security flaw discovered in Skype. Fix not coming anytime soon.

Credit to Author: Shriram Munde| Date: Wed, 14 Feb 2018 09:10:30 +0000

Quick Heal Security Labs has recently learned about a serious vulnerability in Skype’s update installer – that’s the bad news. The worse news is, Microsoft is not going to patch the vulnerability anytime soon as this would require the updater to go through a ‘large code revision’. What is this…

Read more

Machine Learning Approach for Advanced Threat Hunting

Credit to Author: Ajay| Date: Fri, 02 Feb 2018 11:41:12 +0000

In today’s fast-changing world, the cyber threat landscape is getting increasingly complex and signature-based systems are falling behind to protect endpoints. All major security solutions are built with layered security models to protect endpoints from today’s advanced threats. Machine learning-based detections are also becoming an inevitable component of these layered…

Read more