Uncategorized

Auto-launching HiddAd on Google Play Store found in more than 6 million downloads

HiddenAd or HiddAd are icon-hiding adware applications. The prime motive of HiddAd is to generate revenue through aggressive…

HiddAd

Robin Hood Ransomware ‘GOODWILL’ Forces Victim for Charity

Goodwill Ransomware, identified by CloudSEK researchers in March 2022, is known to promote social justice on the internet….

goodwill ransomware

Threat Advisory: CVE-2022-30190 ‘Follina’ – Severe Zero-day Vulnerability discovered in MSDT

A Zero-day Remote Code Execution Vulnerability with high severity has been identified as CVE-2022-30190 “FOLLINA” in Microsoft Windows…

follina vulnerability

Critical Zero-Day “Log4Shell” Vulnerability “CVE-2021-44228” Exploited in the Wild

On December 9, 2021, Apache revealed a severe Remote code execution vulnerability CVE-2021-44228 named “Log4Shell” in Apache Java-based…

log4shell

Update Security Certificate to Install Quick Heal Product Successfully

Issue Received the following installer setup file corruption error during installation of the Quick Heal product. Reason This…

Update security

Introduction of DNS tunneling and how attackers use it.

  What is DNS?  DNS (Domain Name System) is a service that converts hostnames to IP addresses. It…

DNS Tunneling

Anydesk Software Exploited to Spread Babuk Ransomware

We generally see that ransomware attacks are deployed through exploits, unsolicited malicious emails (malspam), or malicious Microsoft Office…

Babuk Ransomware

Stay Alert – Malware Authors Deploy ELF as Windows Loaders to Exploit WSL feature

What is WSL? The Windows Subsystem for Linux (WSL) is a resource inside the Windows operating system that…

WSL (Windows Subsystem for Linux)

CetaRAT APT Group – Targeting the Government Agencies

CetaRAT was seen for the first time in the Operation SideCopy APT. Now it is continuously expanding its…

CETARAT APT GROUP

What is Phishing? A Deep Dive into the Phishing Attack Mechanisms with Tips

Phishing is a technique used to steal credentials, personal information & financial details of a user. The attacker…

Phishing attack