Proactive Measures to Safeguard against the Ransomware Menace

  Ransomware is a sophisticated malware that infects computing devices and holds the data hostage intending to extort…

Are Malware operators using NSIS Installers to bombard Stealers and avoid detection?

  Threat actors have been using new techniques to hide their codes and avoid detection in every manner….

PowerShell: An Attacker’s Paradise

  PowerShell was originally intended as a task automation and configuration management program for system administrators. However, it…

Cobalt Strike 2021 – Analysis of Malicious PowerShell Attack Framework

Cobalt Strike is a widespread threat emulation tool. It is one of the most powerful network attack tools…

Attacker uses tricky technique of Excel 4.0 in Malspam campaign

Use of Phishing emails is not new for cyber-attack and is still one of the classic strategies to…

Ransomware As A Tool – LockerGoga

Ransomware authors keep experimenting with the development of payload in various dimensions. In the timeline of ransomware implementations,…

Anatova, A modular ransomware

While everyone was engaged in new year celebrations, malware authors were busy creating new ransomware for 2019. Quick…

Mongolock Ransomware deletes files and targets databases

Ransomware has become one of the most dangerous cyber-attack methods because of the different techniques it uses to…

Malspam email – Jack of all malware, master of none.

Malspam email or malicious spam emails are considered to be one of the favorite malware delivery channels for…

A new ransomware campaign in the wild,Ryuk!!

Recently, Quick Heal Security Labs observed a new destructive ransomware named ‘Ryuk. Ransomware’. This ransomware campaign has already…