Uncategorized

CetaRAT APT Group – Targeting the Government Agencies

CetaRAT was seen for the first time in the Operation SideCopy APT. Now it is continuously expanding its…

CETARAT APT GROUP

What is Phishing? A Deep Dive into the Phishing Attack Mechanisms with Tips

Phishing is a technique used to steal credentials, personal information & financial details of a user. The attacker…

Phishing attack

Scam Alert: Covid-19 Vaccine Phishing and Money Scam Hits India

As the COVID-19 vaccination drive kicks off in India, phishing scammers are looking to cash in on people’s…

Scam Alert: Covid-19 Vaccine Phishing and Money Scam Hits India

Moving to the cloud? Learn how to manage your cyber risks on the journey to cloud transformation

Cloud adoption has witnessed exponential growth over the past few years. However, it brings forth a new set…

cyber risks

FormBook Malware Returns: New Variant Uses Steganography and In-Memory Loading of multiple stages to steal data

Quick Heal Security Lab has seen a sudden increase in dotnet samples which are using steganography. Initially, in…

FormBook

Quick Heal Announces SHA-1 Deprecation for its Products

  What is SHA-1 and SHA-2, and deprecation of SHA-1? SHA-1 & SHA-2 are algorithms a certificate uses…

SHA-1

Advantages of a secure Wi-Fi router to protect all your connected devices at home

Here’s a hypothetical scenario. You consider yourself a model user in all matters of cybersecurity. You have an…

Wi-fi

This festive season gift your loved ones ‘online security’

Phew, an unprecedented year finally seems to be coming to an end. To put it mildly, it’s been…

Quick Heal Supports Windows 10 October 2020 Update

Microsoft has recently come up with a new update for Windows 10 PCs – Windows 10 October 2020…

Want to stay safe and anonymous on the Internet? Consider using a VPN

We often hear of security experts speak about the benefits of using VPN services when using the Internet….