What is Anti-Virus Software? And Do I really need it ?

If you’re still pondering over these questions, here’s the scoop: yes, you definitely need an antivirus, and we…

BEWARE: Fake Applications are Disguised as Legitimate Ones

In the world of cybercrime, the tactics used by threat actors are constantly evolving, but upon close analysis…

Deep Dive into Royal Ransomware

The rise of ransomware and malware variants has been a growing concern for individuals and organizations alike. With…

THE PERILS OF RANSOMWARE : How to Save yourself from the next attack

In recent years, ransomware attacks have increased in frequency and sophistication, resulting in substantial impact across numerous industries…

Expiro: Old Virus Poses a New Challenge

A recent virus infection faced by some users was swiftly detected as being caused by Expiro. We have…

Your Office Document is at Risk – XLL, A New Attack Vector

  Microsoft Office documents are used worldwide by both corporates and home-users alike.  It’s different office versions, whether…

Cryptojacking on the Rise

There has been a steep rise in Cryptojacking attacks by cybercriminal groups to infiltrate networks and stealthily mine…

What is Cryptojacking? | Detection and Ways of Preventions - Quick heal

UAC Bypass Using CMSTP

With Ransomware attacks surging dramatically over the past year, and reports pegging it as 25% of the total…

UAC (User Account Control) BYPASS USING CMSTP

Uncovering LockBit Black’s Attack Chain and Anti-Forensic Activity

Since the infamous Conti ransomware group disbanded due to source code leaks during the Russia-Ukraine war, the LockBit…

Lockbit 3.0

AsyncRAT Analysis with ChatGPT

  As cyber threats continue to evolve and become more sophisticated, it’s crucial for security researchers and professionals…

AsyncRAT