Estimated reading time: 2 minutes
Defending the organizational perimeter from data breaches forms the crux of an existing security strategy. Neutralizing potential damages emanating out of cybersecurity threats is possible only if the data sets are secured across both sides of the perimeter. When...
Estimated reading time: 3 minutes
Data breaches and cyber-attacks are common occurrences which usually proliferate at an exponential rate. While it is important that enterprises tighten their enclosures, it is also advisable to understand how cybercriminals prepare for a breach. Hacker surveillance is one way...
Estimated reading time: 2 minutes
Quick Heal Security Labs has been observing the infamous Locky ransomware outbreak which kicked off recently in the last week of September. The outbreak started with spam email with various subjects and different attachment names. On 26th September, spam campaign delivering a new...