BEWARE: Fake Applications are Disguised as Legitimate Ones

Credit to Author: Akshay Singla| Date: Mon, 08 May 2023 11:28:38 +0000

In the world of cybercrime, the tactics used by threat actors are constantly evolving, but upon close analysis…

The post BEWARE: Fake Applications are Disguised as Legitimate Ones appeared first on Quick Heal Blog.

Read more

Proactive Measures to Safeguard against the Ransomware Menace

Credit to Author: Quick Heal Security Labs| Date: Fri, 09 Dec 2022 08:18:20 +0000

  Ransomware is a sophisticated malware that infects computing devices and holds the data hostage intending to extort…

The post Proactive Measures to Safeguard against the Ransomware Menace appeared first on Quick Heal Blog | Latest computer security news, tips, and advice.

Read more

Are Malware operators using NSIS Installers to bombard Stealers and avoid detection?

Credit to Author: Tejaswini Sandapolla| Date: Fri, 21 Oct 2022 08:01:28 +0000

  Threat actors have been using new techniques to hide their codes and avoid detection in every manner….

The post Are Malware operators using NSIS Installers to bombard Stealers and avoid detection? appeared first on Quick Heal Blog | Latest computer security news, tips, and advice.

Read more

Malspam email – Jack of all malware, master of none.

Credit to Author: Shriram Munde| Date: Mon, 21 Jan 2019 07:37:49 +0000

Malspam email or malicious spam emails are considered to be one of the favorite malware delivery channels for the attackers to deliver the malware to targeted victims. Attackers also run spam email campaigns to distribute their malware to a large number of users. For attackers to succeed, two things are…

Read more