Estimated reading time: 3 minutes
Disasters, whether they are natural or man-made, can strike anytime without any kind of due notice. Any business, small or big, will need to anticipate the possibility of such disasters and have a plan in place. While one tactic...Estimated reading time: 4 minutes
Earlier we had blogged about how JAVA based jRAT malware were evolved in the recent times. At Quick Heal Security Labs, we are actively observing jRAT campaigns happening in the wild. These JAVA malware spread through phishing campaigns. While analyzing one such phishing campaign, we found...Estimated reading time: 2 minutes
This is an important advisory for our readers about the recently discovered CPU exploits called Meltdown and Spectre. As per the recent disclosure of Meltdown and Spectre vulnerability in popular CPUs, successful exploitation of these vulnerabilities will potentially allow...Estimated reading time: 3 minutes
With increased mobility of the workforce, the Internet of Things increasing presence across industries and companies adopting BYOD policies, endpoint security is becoming the most challenging task for security teams within organizations. Further the ever-growing threat landscape tends to...Estimated reading time: 3 minutes
For the past few years, we have been seeing macro-based attacks through Object Linking Embedding (OLE)/Microsoft Office files. But, presently, attackers are using a different technique to spread malware through Office files – using a new attack vector called ‘Dynamic Data Exchange (DDE)’. DDE is an authorized Microsoft Office feature that provides several...