# Tags
cryptocurrency

Blockchain & Fraud Prevention: Strategies to overcome the cryptocurrency scam

What is Cryptocurrency?  Cryptocurrency is a type of digital currency that generally only exists electronically. There is no physical coin or bill unless you use a service to cash in cryptocurrency for a physical token. You usually exchange cryptocurrency with someone online, with your phone or computer, without using an intermediary like a bank. Bitcoin […]

Sextortion Scam

Sextortion Scam: Blackmail scam emails that demand Bitcoin

What is Sextortion?  Sextortion is a scam via email or any other medium to blackmail the victim and threaten to expose private data like photos, web browsing history, chat history, etc. Generally, these sextortion scammers send emails & claim that they have gained access to the victim’s device, installed a Trojan virus by logging into […]

cyber risks

Moving to the cloud? Learn how to manage your cyber risks on the journey to cloud transformation

Cloud adoption has witnessed exponential growth over the past few years. However, it brings forth a new set of cyber risks that endanger organizations and their customers. In the best-case scenario, these unknown cyber risks may result in increased costs, while in the worst-case scenario, these risks can lead to loss of customers, reputation, business, […]

ransomware attacks

Mitigating Ransomware Attacks: How to keep you and your family safe

There’s a rise in ransomware attacks, and they’re becoming deadlier and more dangerous than ever! A report by Cybersecurity Ventures predicted that businesses in 2021 would fall victim to a ransomware attack every 11 seconds! The total cost of ransomware to businesses would top USD 20 billion this year. Quick Heal Threat Report Q1 2021 detected 0.35 million ransomware […]

FormBook

FormBook Malware Returns: New Variant Uses Steganography and In-Memory Loading of multiple stages to steal data

Quick Heal Security Lab has seen a sudden increase in dotnet samples which are using steganography. Initially, in the static analysis, not much information is available. It resembles some simple application going by the method name. On the dynamic side, some show the activity but another check for sandboxing environment. Apart from this, even on […]

RockYou2021

RockYou2021: Massive data leak of passwords on the dark web

  The issue of a data breach continues to plague the world of cybersecurity. What seems to be the most extensive password collection of all time has been leaked on the dark web. The source? An anonymous forum poster uploaded a 100GB TXT compilation file of stolen and leaked passwords, containing 8.4 billion entries.  Here’s everything you […]

Cobalt Strike 2021 – Analysis of Malicious PowerShell Attack Framework

Cobalt Strike is a widespread threat emulation tool. It is one of the most powerful network attack tools available for penetration testers in the last few years used for various attack capabilities and as a command and control framework. Recently, Cobalt Strike has been used in various ransomware campaigns like Povlsomware Ransomware,  DarkSide Ransomware. Povlsomware […]

Scam Alert Beware of Fake LinkedIn Job Offers

LinkedIn Phishing Scam: Hackers target users with fake job offers

LinkedIn is a popular social networking platform that is focused on professional networking and the business community. On this platform, users are focused almost entirely on making connections and finding jobs. But things are not always as they seem. Of late, LinkedIn is emerging as one of the most popular social networking sites used by […]