Social media credentials are always a lucrative thing for threat actors. They use various techniques to get them….
Social media credentials are always a lucrative thing for threat actors. They use various techniques to get them….
Summary: While the whole world fights against the COVID-19 pandemic, cybercriminals are busy exploiting the situation and…
A critical zero-day vulnerability (CVE-2021-44228) recently discovered Apache Log4J, the popular java open source logging library used in…
We generally see that ransomware attacks are deployed through exploits, unsolicited malicious emails (malspam), or malicious Microsoft Office…
Microsoft has recently developed a new update for Windows 10 PCs, called Windows 10 November 2021 update, version…
What is WSL? The Windows Subsystem for Linux (WSL) is a resource inside the Windows operating system that…
Quick Heal Security Labs has been monitoring various attack campaigns using JSOutProx RAT against different SMBs in…
CetaRAT was seen for the first time in the Operation SideCopy APT. Now it is continuously expanding its…
Phishing is a technique used to steal credentials, personal information & financial details of a user. The attacker…
Microsoft has released an all-new Windows 11 Operating System (OS). This article highlights the new features in Windows…