QBOT – A HTML Smuggling technique to target victims

QBot, also known as Qakbot, QuackBot, and Pinkslipbot, is a Banking Trojan that was first observed in 2007….

Are Malware operators using NSIS Installers to bombard Stealers and avoid detection?

  Threat actors have been using new techniques to hide their codes and avoid detection in every manner….

Robin Hood Ransomware ‘GOODWILL’ Forces Victim for Charity

Goodwill Ransomware, identified by CloudSEK researchers in March 2022, is known to promote social justice on the internet….

What is Phishing? A Deep Dive into the Phishing Attack Mechanisms with Tips

Phishing is a technique used to steal credentials, personal information & financial details of a user. The attacker…

RockYou2021: Massive data leak of passwords on the dark web

  The issue of a data breach continues to plague the world of cybersecurity. What seems to be the most…

CVE-2017-5638 – Apache Struts 2 Remote Code Execution Vulnerability

The well-known open source web application framework Apache Struts 2 is being actively exploited in the wild allowing…

Security Vulnerabilities for Android and iOS Hit An All-time High in 2015

Quick Heal hopes it has been a good year for you. But, has it been a good year…

The 6 Biggest Data Breaches of 2015 So Far

For those of you who are following the news about the leakage of Ashley Madison’s (an American adult…

Stegosploit – A Technique that can Hack your PC Using Just an Image!

By merely looking at an image in your browser, you can infect your PC with a malware. Know…

Apple security in the spotlight and other IT Security news

Apple enjoyed a fine week with the reveal of iOS8 and the new iPhone 6, but in spite…