Proactive Measures to Safeguard against the Ransomware Menace

Credit to Author: Quick Heal Security Labs| Date: Fri, 09 Dec 2022 08:18:20 +0000

  Ransomware is a sophisticated malware that infects computing devices and holds the data hostage intending to extort…

The post Proactive Measures to Safeguard against the Ransomware Menace appeared first on Quick Heal Blog | Latest computer security news, tips, and advice.

Read more

Are Malware operators using NSIS Installers to bombard Stealers and avoid detection?

Credit to Author: Tejaswini Sandapolla| Date: Fri, 21 Oct 2022 08:01:28 +0000

  Threat actors have been using new techniques to hide their codes and avoid detection in every manner….

The post Are Malware operators using NSIS Installers to bombard Stealers and avoid detection? appeared first on Quick Heal Blog | Latest computer security news, tips, and advice.

Read more

PowerShell: An Attacker’s Paradise

Credit to Author: Mrigank Tyagi| Date: Fri, 29 Jul 2022 12:13:02 +0000

  PowerShell was originally intended as a task automation and configuration management program for system administrators. However, it…

The post PowerShell: An Attacker’s Paradise appeared first on Quick Heal Blog | Latest computer security news, tips, and advice.

Read more

Attacker uses tricky technique of Excel 4.0 in Malspam campaign

Credit to Author: Anjali Raut| Date: Sat, 02 Nov 2019 12:56:15 +0000

Use of Phishing emails is not new for cyber-attack and is still one of the classic strategies to compromise a victim’s machine. Cyber criminals lure victims to open email attachments (mostly Doc and XLS files) by faking them to look like important one using keywords like invoice, payment, finance, order…

Read more

Ransomware As A Tool – LockerGoga

Credit to Author: Ghanshyam More| Date: Wed, 03 Jul 2019 07:18:00 +0000

Ransomware authors keep experimenting with the development of payload in various dimensions. In the timeline of ransomware implementations, we have seen its evolution from a simple screen locker to multi-component model for file encryption, from novice approach to a sophisticated one. The Ransomware as a Tool has evolved in wild…

Read more