Stay Alert – Malware Authors Deploy ELF as Windows Loaders to Exploit WSL feature

Credit to Author: Rutuja Mane| Date: Tue, 02 Nov 2021 11:01:48 +0000

What is WSL? The Windows Subsystem for Linux (WSL) is a resource inside the Windows operating system that…

The post Stay Alert – Malware Authors Deploy ELF as Windows Loaders to Exploit WSL feature appeared first on Quick Heal Blog | Latest computer security news, tips, and advice.

Read more

Multi-Staged JSOutProx RAT Targets Indian Co-operative Banks and Finance Companies

Credit to Author: Sameer Patil| Date: Thu, 21 Oct 2021 12:38:32 +0000

  Quick Heal Security Labs has been monitoring various attack campaigns using JSOutProx RAT against different SMBs in…

The post Multi-Staged JSOutProx RAT Targets Indian Co-operative Banks and Finance Companies appeared first on Quick Heal Blog | Latest computer security news, tips, and advice.

Read more

CetaRAT APT Group – Targeting the Government Agencies

Credit to Author: Prashant Tilekar| Date: Wed, 13 Oct 2021 12:39:07 +0000

CetaRAT was seen for the first time in the Operation SideCopy APT. Now it is continuously expanding its…

The post CetaRAT APT Group – Targeting the Government Agencies appeared first on Quick Heal Blog | Latest computer security news, tips, and advice.

Read more

What is Phishing? A Deep Dive into the Phishing Attack Mechanisms with Tips

Credit to Author: Amruta Wagh| Date: Tue, 12 Oct 2021 06:41:08 +0000

Phishing is a technique used to steal credentials, personal information & financial details of a user. The attacker…

The post What is Phishing? A Deep Dive into the Phishing Attack Mechanisms with Tips appeared first on Quick Heal Blog | Latest computer security news, tips, and advice.

Read more

Update – Quick Heal products are compatible with Windows 11

Credit to Author: Quickheal| Date: Tue, 05 Oct 2021 15:47:18 +0000

Microsoft has released an all-new Windows 11 Operating System (OS). This article highlights the new features in Windows…

The post Update – Quick Heal products are compatible with Windows 11 appeared first on Quick Heal Blog | Latest computer security news, tips, and advice.

Read more

How Unlimited Internet Data Has Changed The Face Of Cybercrime?

Credit to Author: Akshay Singla| Date: Fri, 17 Sep 2021 09:37:43 +0000

VoLTE: Voice over LTE is a high-speed wireless communication standard for mobile phones. It has up to three…

The post How Unlimited Internet Data Has Changed The Face Of Cybercrime? appeared first on Quick Heal Blog | Latest computer security news, tips, and advice.

Read more

Blockchain & Fraud Prevention: Strategies to overcome the cryptocurrency scam

Credit to Author: Vijay Yadav| Date: Thu, 16 Sep 2021 08:58:22 +0000

What is Cryptocurrency?  Cryptocurrency is a type of digital currency that generally only exists electronically. There is no…

The post Blockchain & Fraud Prevention: Strategies to overcome the cryptocurrency scam appeared first on Quick Heal Blog | Latest computer security news, tips, and advice.

Read more

Fake Investor John Bernard Sinks Norwegian Green Shipping Dreams

Credit to Author: BrianKrebs| Date: Sat, 29 Jan 2022 18:05:52 +0000

Several articles here have delved into the history of John Bernard, the pseudonym used by a fake billionaire technology investor who’s tricked dozens of start-ups into giving him tens of millions of dollars. Bernard’s latest victim — a Norwegian startup hoping to build a fleet of environmentally friendly shipping vessels — is now embroiled in a lawsuit over a deal gone bad, in which Bernard falsely claimed to have secured $100 million from six other wealthy investors, including the founder of Uber and the artist Abel Makkonen Tesfaye, better known as The Weeknd.

Read more

Who Wrote the ALPHV/BlackCat Ransomware Strain?

Credit to Author: BrianKrebs| Date: Fri, 28 Jan 2022 13:18:36 +0000

In December 2021, researchers discovered a new ransomware-as-a-service named ALPHV (a.k.a. “BlackCat”), considered to be the first professional cybercrime group to create and use a ransomware strain in the Rust programming language. In this post, we’ll explore some of the clues left behind by the developer who was reputedly hired to code the ransomware variant.

Read more

Scary Fraud Ensues When ID Theft & Usury Collide

Credit to Author: BrianKrebs| Date: Tue, 25 Jan 2022 19:48:40 +0000

What’s worse than finding out that identity thieves took out a 546 percent interest payday loan in your name? How about a 900 percent interest loan? Or how about not learning of the fraudulent loan until it gets handed off to collection agents? One reader’s nightmare experience spotlights what can happen when ID thieves and hackers start targeting online payday lenders.

Read more