Email

Your Office Document is at Risk – XLL, A New Attack Vector

  Microsoft Office documents are used worldwide by both corporates and home-users alike.  It’s different office versions, whether…

Proactive Measures to Safeguard against the Ransomware Menace

  Ransomware is a sophisticated malware that infects computing devices and holds the data hostage intending to extort…

Are Malware operators using NSIS Installers to bombard Stealers and avoid detection?

  Threat actors have been using new techniques to hide their codes and avoid detection in every manner….

A sloppy click can exfiltrate your important data!

Phishing email still remains one of the top malware propagation medium. Recently, we came across an interesting phishing email…

Ako Ransomware targeting businesses using RaaS

Ako Ransomware targeting businesses using RaaS Quick Heal security researchers recently observed ransomware that uses RaaS (Ransomware as…

Attacker uses tricky technique of Excel 4.0 in Malspam campaign

Use of Phishing emails is not new for cyber-attack and is still one of the classic strategies to…

Beware! Email attachments can make you victim of spear phishing attacks

In the last few months, we’ve seen a sudden increase in Spear Phishing attacks. Spear phishing is a variation of…

5 ways to instantly detect a phishing email and save yourself from phishing attack

Phishing is a fraudulent activity to trick you into revealing your personal and confidential information. This information usually…

GandCrab Riding Emotet’s Bus!

Emotet Known for constantly changing its payload and infection vectors like spam mail, Malicious Doc and even Malicious JS…

Anatova, A modular ransomware

While everyone was engaged in new year celebrations, malware authors were busy creating new ransomware for 2019. Quick…