Coronavirus, COVID-19 or SARS–CoV–2 has turned the lives of people across the globe into a nightmare. Attackers have utilized the pandemic as an opportunity to spread malware and ransomware by hooking on to the mindset of people in these times of crisis. Organizations opting for remote working setups has also carved out an additional opportunity […]

Read More →

Lemon Duck is a monerocrypto-mining malware. This malware was first spotted in China but has hence spread to other parts of the world. Lemon Duck starts with single infection and spreads rapidly across the entire network converting the resources of an organization into cryptocurrency mining slaves. Researchers from TrapX-Labs have reported that Lemon Duck has […]

Read More →

CCleaner is a system cleanup tool by Piriform, which is now owned by Avast. A suspicious activity was identified on September 12th, 2017, where an unknown IP address receiving data from software found in version 5.33.6162 of CCleaner. Later it was found that the 5.33.6162 version of CCleaner was illegally modified before it was released […]

Read More →

 Image Source: pcworld   Ever wonder why your system running slower than usual, and how those annoying random messages pop-up? or the newly added extensions in your browser, which you never used. The browser can’t load pages, internet connectivity is one thing but your computer is always slow. Those crashes that happen every now and then, […]

Read More →

A new massive threat is making its rounds in the security world. A tricky yet nasty piece of ransomware called Fantom. Many organizations are being infected with this ransomware. But luckily, there are definite ways to evade it and also ways to mitigate the damage without letting the troublemakers win. Fantom ransomware is a devious […]

Read More →

One of the major and serious threats on the internet today is malicious software, often referred to as a Malware. Malware, short form of malicious software, is any software used to disrupt computer operations, gather sensitive information, gain access to private computer systems, or display unwanted advertising. The malware being designed by attackers are polymorphic and […]

Read More →