Estimated reading time: 3 minutes
The worst has happened. Your database has been breached and the company is scrambling for cover. Every second seems to be a time bomb and your IT security team is working overtime, trying to assess the damage. Your CEO...Estimated reading time: 6 minutes
Cyber-attacks through phishing emails are increasing and generally, attackers use DOC embedded macros to infiltrate victim’s machine. Recently Quick Heal Security Labs came across a Phishing e-mail sample which uses Microsoft’s equation editor exploit to spread Hawkeye keylogger. Cybercriminals...