Take your browser security to the next level!

Credit to Author: Swapnil Nigade| Date: Mon, 24 Feb 2020 09:59:32 +0000

  Today, almost every computer user leverages a variety of web browsers to surf the internet — Microsoft Internet Explorer, Mozilla Firefox, and Apple Safari are some of the popular browsers in use in recent times. It is very important to configure internet browser(s) in a secure way because vulnerable web…

Read more

Ouroboros: Following A New Trend In Ransomware League

Credit to Author: Manisha Prajapati| Date: Tue, 18 Feb 2020 09:45:17 +0000

Ransomware authors keep exploring new ways to test their strengths against various malware evasion techniques. The ransomware known as “Ouroboros” is intensifying its footprint in the field by bringing more and more advancements in its behavior as it updates its version. This analysis provides the behaviour of version 6, few…

Read more

A Deep Dive Into Wakeup On Lan (WoL) Implementation of Ryuk

Credit to Author: Goutam Tripathy| Date: Thu, 13 Feb 2020 09:57:14 +0000

Quick Heal Security Labs recently came across a variant of Ryuk Ransomware which contains an additional feature of identifying and encrypting systems in a Local Area Network (LAN). This sample targets the systems which are present in sleep as well as the online state in the LAN. This sample is packed with…

Read more

Hackers are riding on the global panic pertaining to the deadly Coronavirus

Credit to Author: Viraj Talikotkar| Date: Mon, 10 Feb 2020 11:23:42 +0000

Very recently, the Coronavirus that apparently originated from the Wuhan province in China has created pandemonium across the world creating an atmosphere of a health crisis for the global populace. As the news of the deadly Coronavirus creates waves of panic across the globe, cyberattackers are lurking into this phenomenon…

Read more

Why secure your IoT Devices?

Credit to Author: Sachin Bobade| Date: Thu, 06 Feb 2020 10:45:22 +0000

Introduction to IoT This blog describes one of the current disruptive technologies in the market, i.e. IoT (Internet of Things) devices. The Internet of things (IoT) is the Internet of connected physical devices, vehicles, appliances and everyday objects that can collect & share information without any intervention. Due to IoT…

Read more

HorseDeal Riding on The Curveball!

Credit to Author: Jayesh kulkarni| Date: Wed, 05 Feb 2020 06:17:49 +0000

It’s surprising to see how quickly attackers make use of new vulnerabilities in malware campaigns. Microsoft recently patched a very interesting vulnerability in their monthly Patch Tuesday update for January 2020. It’s a spoofing vulnerability in Windows CryptoAPI (Crypt32.dll) validation mechanism for Elliptic Curve Cryptography (ECC) certificates. An attacker could…

Read more