The recent zero-day vulnerability CVE-2018-4878 in Adobe Flash Player enables attackers to perform a Remote Code Execution on…
The recent zero-day vulnerability CVE-2018-4878 in Adobe Flash Player enables attackers to perform a Remote Code Execution on…
In today’s fast-changing world, the cyber threat landscape is getting increasingly complex and signature-based systems are falling behind…
What is web filtering? Web filtering, also known as content filtering and URL filtering, restricts access to certain…
Cryptocurrencies like Bitcoin, Monero, Ethereum, Litecoin, and Tezos are in full swing. And they have exponentially increased cryptocurrency mining (or cryptomining) activities. Previously, cryptomining was carried out by powerful and dedicated mining…
If our readers can recollect, Quick Heal Security Labs had released an important advisory about an Android banking…
What exactly is a vulnerability? A security vulnerability (also known as a security hole) is a security flaw…
AVLab is an independent organization that conducts tests on security software for corporate networks and individual user devices….
You might be aware that LIC policyholders must now link their Aadhaar and PAN to their policies according…
IcedID is a new player in the banking Trojan family. It has a modular architecture and capable of…
If you weren’t careful with your incoming emails, then it’s time you should. Attackers have released 12.5 million…