Anydesk Software Exploited to Spread Babuk Ransomware

Credit to Author: Preksha Saxena| Date: Wed, 24 Nov 2021 11:02:35 +0000

We generally see that ransomware attacks are deployed through exploits, unsolicited malicious emails (malspam), or malicious Microsoft Office…

The post Anydesk Software Exploited to Spread Babuk Ransomware appeared first on Quick Heal Blog | Latest computer security news, tips, and advice.

Read more

Stay Alert – Malware Authors Deploy ELF as Windows Loaders to Exploit WSL feature

Credit to Author: Rutuja Mane| Date: Tue, 02 Nov 2021 11:01:48 +0000

What is WSL? The Windows Subsystem for Linux (WSL) is a resource inside the Windows operating system that…

The post Stay Alert – Malware Authors Deploy ELF as Windows Loaders to Exploit WSL feature appeared first on Quick Heal Blog | Latest computer security news, tips, and advice.

Read more

CetaRAT APT Group – Targeting the Government Agencies

Credit to Author: Prashant Tilekar| Date: Wed, 13 Oct 2021 12:39:07 +0000

CetaRAT was seen for the first time in the Operation SideCopy APT. Now it is continuously expanding its…

The post CetaRAT APT Group – Targeting the Government Agencies appeared first on Quick Heal Blog | Latest computer security news, tips, and advice.

Read more

What is Phishing? A Deep Dive into the Phishing Attack Mechanisms with Tips

Credit to Author: Amruta Wagh| Date: Tue, 12 Oct 2021 06:41:08 +0000

Phishing is a technique used to steal credentials, personal information & financial details of a user. The attacker…

The post What is Phishing? A Deep Dive into the Phishing Attack Mechanisms with Tips appeared first on Quick Heal Blog | Latest computer security news, tips, and advice.

Read more

KidsGuard stalkerware leaks data on secretly surveilled victims

Credit to Author: Lisa Vaas| Date: Mon, 24 Feb 2020 13:28:57 +0000

The company left a server open and unprotected, regurgitating private data slurped from thousands of surveilled people, including children.<img src=”http://feeds.feedburner.com/~r/nakedsecurity/~4/F2UPHduG6YE” height=”1″ width=”1″ alt=””/>

Read more

New wave of Mal-Spam campaign attaching Disk Imaging Files

Credit to Author: Prakash Galande| Date: Fri, 24 Jan 2020 11:04:10 +0000

From past few months at Quick-Heal Labs, we have been observing a sudden rise in Spear Phishing mail containing distinct file formats as attachment like IMG, ISO, etc. These new types of attachments are mainly used to deploy some well-known and older Remote Access Trojans. The subject of these emails…

Read more

Ako Ransomware targeting businesses using RaaS

Credit to Author: Shriram Munde| Date: Fri, 24 Jan 2020 11:00:51 +0000

Ako Ransomware targeting businesses using RaaS Quick Heal security researchers recently observed ransomware that uses RaaS (Ransomware as a Service) which is a subpart of MaaS (Malware as a Service). Before delving into the AKO ransomware or RaaS, one must understand what Malware as a Service means, as it is…

Read more

The Summit of Cybersecurity Sits Among the Clouds

Credit to Author: Trend Micro| Date: Mon, 06 Jan 2020 17:38:33 +0000

Trend Micro Apex One™ as a Service You have heard it before, but it needs to be said again—threats are constantly evolving and getting sneakier, more malicious, and harder to find than ever before. It’s a hard job to stay one step ahead of the latest threats and scams organizations come across, but it’s something…

The post The Summit of Cybersecurity Sits Among the Clouds appeared first on .

Read more