Moving to the cloud? Learn how to manage your cyber risks on the journey to cloud transformation

Cloud adoption has witnessed exponential growth over the past few years. However, it brings forth a new set…

cyber risks

Mitigating Ransomware Attacks: How to keep you and your family safe

There’s a rise in ransomware attacks, and they’re becoming deadlier and more dangerous than ever! A report by…

ransomware attacks

FormBook Malware Returns: New Variant Uses Steganography and In-Memory Loading of multiple stages to steal data

Quick Heal Security Lab has seen a sudden increase in dotnet samples which are using steganography. Initially, in…

FormBook

RockYou2021: Massive data leak of passwords on the dark web

  The issue of a data breach continues to plague the world of cybersecurity. What seems to be the most…

RockYou2021

Cobalt Strike 2021 – Analysis of Malicious PowerShell Attack Framework

Cobalt Strike is a widespread threat emulation tool. It is one of the most powerful network attack tools…

LinkedIn Phishing Scam: Hackers target users with fake job offers

LinkedIn is a popular social networking platform that is focused on professional networking and the business community. On…

Scam Alert Beware of Fake LinkedIn Job Offers

Quick Heal Announces SHA-1 Deprecation for its Products

  What is SHA-1 and SHA-2, and deprecation of SHA-1? SHA-1 & SHA-2 are algorithms a certificate uses…

SHA-1

Can I keep using WhatsApp without accepting their privacy policies?

WhatsApp’s new controversial privacy policies have been in the news lately and a hot topic of discussion among…

Ficker – An Info-Stealer Malware that tricks people to get their passwords

Credential stealer malware is the most prevalent types of malware used in cyber-attacks. We have seen a lot…

Ficker Stealer Malware tricks people into getting passwords

Alert! Wormable Android malware is spreading through social media applications

Autoreply is a convenient feature through which users can send a custom message as an automatic reply for…