#Cybersecurity #Malware #Uncategorized #Vulnerability Critical Zero-Day “Log4Shell” Vulnerability “CVE-2021-44228” Exploited in the Wild On December 9, 2021, Apache revealed a severe Remote code execution vulnerability CVE-2021-44228 named “Log4Shell” in Apache Java-based log4J logging Amruta Wagh / 4 years Comment (0) (263)
#Uncategorized Update Security Certificate to Install Quick Heal Product Successfully Issue Received the following installer setup file corruption error during installation of the Quick Heal product. Reason This error occurs Quickheal / 4 years Comment (0) (434)
#Cybersecurity #Uncategorized Introduction of DNS tunneling and how attackers use it. What is DNS? DNS (Domain Name System) is a service that converts hostnames to IP addresses. It is an Rahul Pawar / 4 years Comment (0) (400)
#Ransomware #Security #Uncategorized Anydesk Software Exploited to Spread Babuk Ransomware We generally see that ransomware attacks are deployed through exploits, unsolicited malicious emails (malspam), or malicious Microsoft Office documents. Attackers Preksha Saxena / 4 years Comment (0) (537)
#Cybersecurity #Uncategorized Stay Alert – Malware Authors Deploy ELF as Windows Loaders to Exploit WSL feature What is WSL? The Windows Subsystem for Linux (WSL) is a resource inside the Windows operating system that allows users Rutuja Mane / 4 years Comment (0) (323)
#Cybersecurity #Malware #Uncategorized CetaRAT APT Group – Targeting the Government Agencies CetaRAT was seen for the first time in the Operation SideCopy APT. Now it is continuously expanding its activity since Prashant Tilekar / 4 years Comment (0) (265)
#Cybersecurity #Phishing #Uncategorized What is Phishing? A Deep Dive into the Phishing Attack Mechanisms with Tips Phishing is a technique used to steal credentials, personal information & financial details of a user. The attacker sends email Amruta Wagh / 4 years Comment (0) (601)
#Cybersecurity #Phishing #Uncategorized Scam Alert: Covid-19 Vaccine Phishing and Money Scam Hits India As the COVID-19 vaccination drive kicks off in India, phishing scammers are looking to cash in on people’s quest to Amruta Wagh / 4 years Comment (0) (240)
#Cybersecurity #Uncategorized Moving to the cloud? Learn how to manage your cyber risks on the journey to cloud transformation Cloud adoption has witnessed exponential growth over the past few years. However, it brings forth a new set of cyber Srinath Vangari / 5 years Comment (0) (129)
#Cybersecurity #Phishing #Uncategorized FormBook Malware Returns: New Variant Uses Steganography and In-Memory Loading of multiple stages to steal data Quick Heal Security Lab has seen a sudden increase in dotnet samples which are using steganography. Initially, in the static Rumana Siddiqui / 5 years Comment (0) (355)