# Tags

Quick Heal thwarts attempts of a JAVA jRAT phishing campaign targeting an international embassy in India

Earlier we had blogged about how JAVA based jRAT malware were evolved in the recent times. At Quick Heal Security Labs, we are actively observing jRAT campaigns happening in the wild. These JAVA malware spread through phishing campaigns. While analyzing one such phishing campaign, we found that an International embassy in India was being targeted by phishers. The malware used in the phishing campaign was the infamous JAVA malware called jRAT.  Phishers sent phishing emails to the official email […]

Chrome extensions exploited in a massive PUA campaign

Browser extensions also known as add-ons or plug-ins are programs that extend the functionality of a web browser making it more convenient to use and giving a better browsing experience. Browser extensions are commonly used to Enhance the appearance as per convenience Add to the functionality of the browser Incorporate with other services and features […]

Here’s how you can stay safe from the Android Banking Trojan that targets banking apps

If our readers can recollect, Quick Heal Security Labs had released an important advisory about an Android banking Trojan that is known to target about 232 banking apps. As a continuation of the post, here we will help you understand how you can protect yourself from this malware by following some simple security measures. First, […]

Quick Heal is compatible with Microsoft’s Jan 3 update for Meltdown and Spectre

This is an important advisory for our readers about the recently discovered CPU exploits called Meltdown and Spectre. As per the recent disclosure of Meltdown and Spectre vulnerability in popular CPUs, successful exploitation of these vulnerabilities will potentially allow an attacker to access recently accessed sensitive information like usernames and passwords from the system memory. […]

What do we need to know about the CPU vulnerabilities Meltdown and Spectre?

What exactly is a vulnerability? A security vulnerability (also known as a security hole) is a security flaw detected in a product that may leave it open to hackers and malware. Using such vulnerabilities, attackers can exploit the affected system/product for their profit in various ways. What is an exploit? Exploits are attacks performed on a […]

Android banking Trojan targets more than 232 apps including apps offered by Indian banks

Quick Heal Security Labs detected an Android Banking Trojan that targets more than 232 banking apps including those offered by Indian banks. The malware is known as Android.banker.A2f8a (Previously detected as Android.banker.A9480). Like most other Android banking malware, even this one is designed for stealing login credentials, hijacking SMSs, uploading contact lists and SMSs on a […]

Cybersecurity prediction for 2018

Cybersecurity Predictions: What to expect in 2018

Get ready! 2018 is going to be much worse for cybersecurity than what it was for 2017. Before we get on with the cybersecurity predictions for 2018, let’s take a quick flashback of 2017 2017 was riddled with cybersecurity mayhem: WannaCry – the biggest ransomware attack in history; took down over 300,000 computers worldwide, closely […]

Beware of fake apps that claim to link your mobile number to Aadhaar

Are you looking for ways to avoid visiting your cellular network provider’s care center/store to get your Aadhaar linked to your mobile number? Have you recently searched for apps that can help you do this? Well, here is some important and useful information for you. It is now mandatory for all mobile users to link […]