PowerShell: Living off the land!

Trend of PowerShell based malware is increasing. General trend observed shows that malware authors use new techniques for…

Cybersquatting and Typosquatting victimizing innocent customers and brands

The rapid shift of brands towards online platforms and ecommerce portals, has opened the gates for cyber threats…

Phishers using custom 404 Not Found error page to steal Microsoft credentials

In the latest of its kind phishing attacks, phishers have been found to use custom 404 Not Found…

Alert! 27 apps found on Google Play Store that prompt you to install Fake Google Play Store

Quick Heal Security Lab spotted 27 malicious apps of dropper category on official “Google Play Store”. These apps…

Android based IoT devices with open ADB port inviting easy attacks by Crypto-miners

The rapid pace at which connected smart home devices are increasing, have opened the gates for a new…

MegaCortex Returns…

MegaCortex, a ransomware which was first spotted in January this year, has become active again and has changed…

Trinity Miner using open ADB port to target IoT devices

In the 21st century, life is becoming smart and evolving at a fast pace. Even day to day…

Webcam Hacking – How to prevent webcam from hacking into your privacy?

Imagine a day when you open your inbox and there’s this one mail containing obscene pics of you…

Ransomware As A Tool – LockerGoga

Ransomware authors keep experimenting with the development of payload in various dimensions. In the timeline of ransomware implementations,…

Beware! Email attachments can make you victim of spear phishing attacks

In the last few months, we’ve seen a sudden increase in Spear Phishing attacks. Spear phishing is a variation of…