Ethical Web Scraping and Crawling: Navigating the Digital World Responsibly

The wealth of data available on the internet and the infinite potential that it has to offer requires much diligence and technique to unlock. This is where ‘Web Crawling’ and ‘Web Scraping’ come in. However, since its introduction, the term “Web Scraping” has been associated with a common misconception – the question of its legality. […]

AsyncRAT

AsyncRAT Analysis with ChatGPT

  As cyber threats continue to evolve and become more sophisticated, it’s crucial for security researchers and professionals to stay ahead of the curve. In this post, ⦁ We will explore how ChatGPT can assist in the analysis of malware, specifically the Remote Access Trojan (RAT) known as AsyncRAT and, ⦁ We will also delve […]

QBOT – A HTML Smuggling technique to target victims

QBot, also known as Qakbot, QuackBot, and Pinkslipbot, is a Banking Trojan that was first observed in 2007. Today, Qbot is still a vicious and persistent threat to organizations and has become one of the leading Banking Trojans globally. Over the years, it has changed its initial techniques to deliver payloads like using VBA macros, […]

Are Malware operators using NSIS Installers to bombard Stealers and avoid detection?

  Threat actors have been using new techniques to hide their codes and avoid detection in every manner. They now use a new trend through NSIS (Nullsoft Scriptable Install System), which is an open-source installer that can bundle various files together. In the past, Malware attackers have used this NSIS-based crypter to hide themselves. This […]

goodwill ransomware

Robin Hood Ransomware ‘GOODWILL’ Forces Victim for Charity

Goodwill Ransomware, identified by CloudSEK researchers in March 2022, is known to promote social justice on the internet. It is known to encrypt documents, databases, videos, or photos after it infects the whole system. The files become inaccessible for the victims, where Robinhood’ Goodwill’ asks the victim to donate for socially driven activities to get […]

Phishing attack

What is Phishing? A Deep Dive into the Phishing Attack Mechanisms with Tips

Phishing is a technique used to steal credentials, personal information & financial details of a user. The attacker sends email or text to spoof the target, luring them to open malicious links or attachments. The most prevalent ways attackers attempt phishing attack are through social networking sites, SMS, and email notifications. We see a sudden […]

RockYou2021

RockYou2021: Massive data leak of passwords on the dark web

  The issue of a data breach continues to plague the world of cybersecurity. What seems to be the most extensive password collection of all time has been leaked on the dark web. The source? An anonymous forum poster uploaded a 100GB TXT compilation file of stolen and leaked passwords, containing 8.4 billion entries.  Here’s everything you […]

CVE-2017-5638 – Apache Struts 2 Remote Code Execution Vulnerability

The well-known open source web application framework Apache Struts 2 is being actively exploited in the wild allowing hackers to launch a remote code execution attack.  To address this issue, Apache has issued a security advisory and CVE-2017-5638 has been assigned to it. The zero-day bug has been rated with the highest severity rating ‘High’. […]

Security Vulnerabilities for Android and iOS Hit An All-time High in 2015

Quick Heal hopes it has been a good year for you. But, has it been a good year for your mobile devices as well? It has been an alarming year for both Android and iOS users. If Android users were vulnerable to Stagefright attacks, iOS users had their own share of vulnerabilities with the Masque […]