CetaRAT was seen for the first time in the Operation SideCopy APT. Now it is continuously expanding its…
CetaRAT was seen for the first time in the Operation SideCopy APT. Now it is continuously expanding its…
Phishing is a technique used to steal credentials, personal information & financial details of a user. The attacker…
As the COVID-19 vaccination drive kicks off in India, phishing scammers are looking to cash in on people’s…
Cloud adoption has witnessed exponential growth over the past few years. However, it brings forth a new set…
Quick Heal Security Lab has seen a sudden increase in dotnet samples which are using steganography. Initially, in…
What is SHA-1 and SHA-2, and deprecation of SHA-1? SHA-1 & SHA-2 are algorithms a certificate uses…
Here’s a hypothetical scenario. You consider yourself a model user in all matters of cybersecurity. You have an…
Phew, an unprecedented year finally seems to be coming to an end. To put it mildly, it’s been…
Microsoft has recently come up with a new update for Windows 10 PCs – Windows 10 October 2020…
We often hear of security experts speak about the benefits of using VPN services when using the Internet….