Estimated reading time: 2 minutes
The dual extension or double extension is one of the oldest forms of cyber-attacks but continues to be extremely effective. The reason for the continued effectiveness of this type of attack lies in its simplicity. File extensions are so...
Estimated reading time: 2 minutes
An insight into Transparent Tribe’s sub-division which has been incorrectly attributed for years. Introduction Quick Heal’s threat intelligence team recently uncovered evidence of an advanced persistent threat (APT) against Indian defence forces. Our analysis shows that many old campaigns...
Estimated reading time: 2 minutes
Summary: We are happy to announce the availability of “best-in-class”, indigenously developed new and improved AV Scan Engine that implements advanced technology to provide maximum protection against evolving global threats and includes following improvements: Lightweight: Reduced disk footprint Reduced...
Estimated reading time: 3 minutes
Year-after-year, apart from malware, the cybersecurity industry continues to face the major threat of finding skilled professionals. It’s a crisis that has been validated by concerning numbers from different sources — a report in 2018 by the International Information...