Estimated reading time: 2 minutes
SHA-1 and SHA-2 are the digest algorithms of the code signing certificate used by Seqrite to sign the code of its products. According to an announcement, Microsoft will no longer allow certificate providers to issue SHA-1 supported certificates. Seqrite has...Information Technology, Network Security & Cybersecurity Updates
Estimated reading time: 7 minutes
On March 2, Microsoft announced a threat group, HAFNIUM, is actively exploiting four zero-day vulnerabilities in their Exchange Servers. Microsoft has released out-of-band security updates (CVE-2021-26855, CVE-2021-26857, CVE-2021-26858, and CVE-2021-27065), enabling attackers to take access email accounts and run...Estimated reading time: 5 minutes
Introduction: Researchers at Quick Heal Security Labs have uncovered a potential Spear Phishing campaign targeted against Indian Army personnel. In this attack, the attackers are using “Army Welfare Education Society” Scholarship form as lure. About AWES: Army Welfare Education...