Persistence in the Shadows: A Study of Zephyr Miner Exploiting System Services

Crypto Mining Crypto mining is the process by which individuals or organizations use computer power to solve complex…

7 Reasons why you need Quick Heal to Combat Financial Frauds

Earlier this year, The Hindu reported that 9% of Indian families claim to be victims of online financial…

What is Anti-Virus Software? And Do I really need it ?

If you’re still pondering over these questions, here’s the scoop: yes, you definitely need an antivirus, and we…

AsyncRAT Analysis with ChatGPT

  As cyber threats continue to evolve and become more sophisticated, it’s crucial for security researchers and professionals…

AsyncRAT

Proactive Measures to Safeguard against the Ransomware Menace

  Ransomware is a sophisticated malware that infects computing devices and holds the data hostage intending to extort…

QBOT – A HTML Smuggling technique to target victims

QBot, also known as Qakbot, QuackBot, and Pinkslipbot, is a Banking Trojan that was first observed in 2007….

Are Malware operators using NSIS Installers to bombard Stealers and avoid detection?

  Threat actors have been using new techniques to hide their codes and avoid detection in every manner….

A DEEP DIVE INTO NEW 64 BIT EMOTET MODULES

Emotet is usually delivered by SPAM campaigns containing document files. This self-propagating Trojan is a downloader malware that…

New 64 BIT Emotet Modules

PowerShell: An Attacker’s Paradise

  PowerShell was originally intended as a task automation and configuration management program for system administrators. However, it…

POWERSHELL: AN ATTACKER’S PARADISE

Introduction of DNS tunneling and how attackers use it.

  What is DNS?  DNS (Domain Name System) is a service that converts hostnames to IP addresses. It…

DNS Tunneling