Estimated reading time: 3 minutes
2017 was a highly eventful year for cybersecurity experts as they incessantly kept combating the proliferating security incidents with considerable success. While a few incidents grabbed the headlines, a majority of cyber-attacks went unannounced. Now in 2018, it seems...Estimated reading time: 3 minutes
Although there aren’t many predefined standards for naming malware and vulnerabilities, they are often segregated according to the genre, impact and even malicious functionalities. Moreover, giving unique names to the vulnerabilities is nearly impossible due to the expansive conglomerate...Estimated reading time: 3 minutes
Cyber-attacks are constantly posing threats of significant proportions, and it’s important to consider their evolving nature while setting up a response plan. Be it dealing with the growing economic espionage or acts of internal and external corruption; companies often...Estimated reading time: 3 minutes
Organizations using software modules are more likely to get affected by intruders and unsolicited access. Moreover, if the software is popular, there are additional chances that the connected services and written codes might attract hackers and malicious parties. Security...Estimated reading time: 3 minutes
While ransomware threats keep bothering businesses regardless of their stature and size, organizations are slowly but steadily resorting to proactivity, to prevent infections and potential sabotages. The most frightening aspect of ransomware attacks is the evolution and sophistication on...Estimated reading time: 2 minutes
Quick Heal Security Labs has been observing the infamous Locky ransomware outbreak which kicked off recently in the last week of September. The outbreak started with spam email with various subjects and different attachment names. On 26th September, spam campaign delivering a new...