While the world is still adapting to the new normal and mobile devices replace PCs as the primary…
While the world is still adapting to the new normal and mobile devices replace PCs as the primary…
Social media credentials are always a lucrative thing for threat actors. They use various techniques to get them….
We generally see that ransomware attacks are deployed through exploits, unsolicited malicious emails (malspam), or malicious Microsoft Office…
What is WSL? The Windows Subsystem for Linux (WSL) is a resource inside the Windows operating system that…
CetaRAT was seen for the first time in the Operation SideCopy APT. Now it is continuously expanding its…
At the start of February 2021, Bazarloader malware was in the news about its mechanism of delivering the…
Quick Heal Security Lab has seen a sudden increase in dotnet samples which are using steganography. Initially, in…
Warzone RAT is part of an APT campaign named “Confucius.” Confucius APT is known to target government sectors…
Have you received an email notification that your domain is about to expire? Most website owners have. But…
For the last three years, Joker Trojan is making its way on Google Play Store. Quick Heal Security…