Social media credentials are always a lucrative thing for threat actors. They use various techniques to get them….
Social media credentials are always a lucrative thing for threat actors. They use various techniques to get them….
Summary: While the whole world fights against the COVID-19 pandemic, cybercriminals are busy exploiting the situation and…
A critical zero-day vulnerability (CVE-2021-44228) recently discovered Apache Log4J, the popular java open source logging library used in…
Microsoft has recently developed a new update for Windows 10 PCs, called Windows 10 November 2021 update, version…
Quick Heal Security Labs has been monitoring various attack campaigns using JSOutProx RAT against different SMBs in…
Microsoft has released an all-new Windows 11 Operating System (OS). This article highlights the new features in Windows…
VoLTE: Voice over LTE is a high-speed wireless communication standard for mobile phones. It has up to three…
What is Cryptocurrency? Cryptocurrency is a type of digital currency that generally only exists electronically. There is no…
At the start of February 2021, Bazarloader malware was in the news about its mechanism of delivering the…
What is Sextortion? Sextortion is a scam via email or any other medium to blackmail the victim and…