Estimated reading time: 4 minutes
Earlier we had blogged about how JAVA based jRAT malware were evolved in the recent times. At Quick Heal Security Labs, we are actively observing jRAT campaigns happening in the wild. These JAVA malware spread through phishing campaigns. While analyzing one such phishing campaign, we found...Information Technology, Network Security & Cybersecurity Updates
Estimated reading time: 3 minutes
Authentication can easily be termed as the foundation of any eBusiness. With companies expanding their audience-base, it becomes important that they concentrate on user-authentication for validating and securing their identity. Reliable authentication also lays the foundation for asset and...Estimated reading time: 2 minutes
This is an important advisory for our readers about the recently discovered CPU exploits called Meltdown and Spectre. As per the recent disclosure of Meltdown and Spectre vulnerability in popular CPUs, successful exploitation of these vulnerabilities will potentially allow...Estimated reading time: 3 minutes
With the cybersecurity threat-landscape evolving with each passing day, it becomes important that organizations opt for newer and safer strategies for staying functional without worrying about cyber-threats. Moreover, organizations must readily focus on cybersecurity while keeping a track of...