APT-27 like Newcore RAT, Virut exploiting MySQL for targeted attacks on enterprise

In today’s world data is everything, and to store and process this large amount of data, everyone started…

JCry – A Ransomware written in Golang!

For several months, QH Labs has been observing an upswing in ransomware activity. We found a new ransomware which…

Malspam email – Jack of all malware, master of none.

Malspam email or malicious spam emails are considered to be one of the favorite malware delivery channels for…

Obfuscated Equation Editor Exploit (CVE-2017-11882) spreading Hawkeye Keylogger

Cyber-attacks through phishing emails are increasing and generally, attackers use DOC embedded macros to infiltrate victim’s machine. Recently…

Again! A New .NET Ransomware Shrug2

For several months, Quick Heal Security Labs has been observing an increase in ransomware which are built in  .NET framework. Ransomware like…

Quick Heal detects malware misusing the fame of Patanjali’s Kimbho app

When Patanjali’s Kimbho app came to Google Play Store, it made some headlines on the Internet, newspapers, TVs,…

A new ransom-miner malware campaign emerging in wild!

Since the past few weeks, Quick Heal Security Labs has been observing a series of interesting malware blocked…

Cryptocurrency mining rampage throttles Linux machines – an analysis by Quick Heal Security Labs

Quick Heal Security Labs recently came across a Linux-based Monero (XMR) miner. Monero (XMR) is one of the…

Breed of MBR Infecting Ransomware – an analysis by Quick Heal Security Labs

Ransomware is becoming one of the most perilous cyberattack methods and also the most habitual techniques for cybercriminals…

8 tips to avoid a spyware attack

Spyware refers to software that spy on your Internet browsing activities, record keystrokes, and collect almost any type…