Cobalt Strike 2021 – Analysis of Malicious PowerShell Attack Framework

Cobalt Strike is a widespread threat emulation tool. It is one of the most powerful network attack tools…

LinkedIn Phishing Scam: Hackers target users with fake job offers

LinkedIn is a popular social networking platform that is focused on professional networking and the business community. On…

Scam Alert Beware of Fake LinkedIn Job Offers

Quick Heal announces SHA-1 deprecation for its products

  What is SHA-1 and SHA-2, and deprecation of SHA-1? SHA-1 & SHA-2 are algorithms a certificate uses…

Can I keep using WhatsApp without accepting their privacy policies?

WhatsApp’s new controversial privacy policies have been in the news lately and a hot topic of discussion among…

Ficker – An Info-Stealer Malware that tricks people to get their passwords

Credential stealer malware is the most prevalent types of malware used in cyber-attacks. We have seen a lot…

Ficker Stealer Malware tricks people into getting passwords

Alert! Wormable Android malware is spreading through social media applications

Autoreply is a convenient feature through which users can send a custom message as an automatic reply for…

Malicious malware impacting reviews and ratings of application

COVID-19 pandemic has confined a big part of the population indoors, doing their work and daily chores online….

Cyber threats against Macs are increasing! Are you prepared?

Let’s get to the point immediately: if you use an Apple Mac system, it doesn’t mean that you…

The risks of downloading apps from unauthorized app stores

As an avid smartphone user, do you get frustrated at not finding the app you want on the…

Risk of downloading apps from unauthorized stores

Hacker sabotage: Are they now going for your car?

It might sound like a story from the world of science-fiction. But it’s a scenario that has become…

Can your car be hijacked remotely?