Anydesk Software Exploited to Spread Babuk Ransomware

Credit to Author: Preksha Saxena| Date: Wed, 24 Nov 2021 11:02:35 +0000

We generally see that ransomware attacks are deployed through exploits, unsolicited malicious emails (malspam), or malicious Microsoft Office…

The post Anydesk Software Exploited to Spread Babuk Ransomware appeared first on Quick Heal Blog | Latest computer security news, tips, and advice.

Read more

Stay Alert – Malware Authors Deploy ELF as Windows Loaders to Exploit WSL feature

Credit to Author: Rutuja Mane| Date: Tue, 02 Nov 2021 11:01:48 +0000

What is WSL? The Windows Subsystem for Linux (WSL) is a resource inside the Windows operating system that…

The post Stay Alert – Malware Authors Deploy ELF as Windows Loaders to Exploit WSL feature appeared first on Quick Heal Blog | Latest computer security news, tips, and advice.

Read more

CetaRAT APT Group – Targeting the Government Agencies

Credit to Author: Prashant Tilekar| Date: Wed, 13 Oct 2021 12:39:07 +0000

CetaRAT was seen for the first time in the Operation SideCopy APT. Now it is continuously expanding its…

The post CetaRAT APT Group – Targeting the Government Agencies appeared first on Quick Heal Blog | Latest computer security news, tips, and advice.

Read more

What is Phishing? A Deep Dive into the Phishing Attack Mechanisms with Tips

Credit to Author: Amruta Wagh| Date: Tue, 12 Oct 2021 06:41:08 +0000

Phishing is a technique used to steal credentials, personal information & financial details of a user. The attacker…

The post What is Phishing? A Deep Dive into the Phishing Attack Mechanisms with Tips appeared first on Quick Heal Blog | Latest computer security news, tips, and advice.

Read more

Scam Alert: Covid-19 Vaccine Phishing and Money Scam Hits India

Credit to Author: Amruta Wagh| Date: Thu, 09 Sep 2021 09:19:32 +0000

As the COVID-19 vaccination drive kicks off in India, phishing scammers are looking to cash in on people’s…

The post Scam Alert: Covid-19 Vaccine Phishing and Money Scam Hits India appeared first on Quick Heal Blog | Latest computer security news, tips, and advice.

Read more

Moving to the cloud? Learn how to manage your cyber risks on the journey to cloud transformation

Credit to Author: Srinath Vangari| Date: Wed, 11 Aug 2021 09:12:06 +0000

Cloud adoption has witnessed exponential growth over the past few years. However, it brings forth a new set…

The post Moving to the cloud? Learn how to manage your cyber risks on the journey to cloud transformation appeared first on Quick Heal Blog | Latest computer security news, tips, and advice.

Read more

FormBook Malware Returns: New Variant Uses Steganography and In-Memory Loading of multiple stages to steal data

Credit to Author: Rumana Siddiqui| Date: Wed, 21 Jul 2021 14:28:50 +0000

Quick Heal Security Lab has seen a sudden increase in dotnet samples which are using steganography. Initially, in…

The post FormBook Malware Returns: New Variant Uses Steganography and In-Memory Loading of multiple stages to steal data appeared first on Quick Heal Blog | Latest computer security news, tips, and advice.

Read more

Quick Heal announces SHA-1 deprecation for its products

Credit to Author: Quickheal| Date: Thu, 27 May 2021 12:29:43 +0000

  What is SHA-1 and SHA-2, and deprecation of SHA-1? SHA-1 & SHA-2 are algorithms a certificate uses…

The post Quick Heal announces SHA-1 deprecation for its products appeared first on Quick Heal Blog | Latest computer security news, tips, and advice.

Read more