Estimated reading time: 5 minutes
2017 was the year of ransomware and cryptocurrency miners but we are still seeing infectors posing a prominent attack vector. However, old infectors still remain a significant threat to users. In 2017, we observed a few old infector families...Estimated reading time: 3 minutes
When it comes to handling the cybersecurity threats, enterprises often concentrate on addressing standalone vulnerabilities and security incidents. Organizations believe that mitigating individual threats can keep catastrophic attacks at bay but the modern threat landscape is way more sophisticated than...Estimated reading time: 4 minutes
2017 has been a year of several high-profile cyber-attacks with an excruciatingly large number of breaches originating from third-party software modules and compromised accounts. With hackers constantly trying to gain access to confidential data sets, it is important to...Estimated reading time: 3 minutes
Although there aren’t many predefined standards for naming malware and vulnerabilities, they are often segregated according to the genre, impact and even malicious functionalities. Moreover, giving unique names to the vulnerabilities is nearly impossible due to the expansive conglomerate...Estimated reading time: 3 minutes
For the past few years, we have been seeing macro-based attacks through Object Linking Embedding (OLE)/Microsoft Office files. But, presently, attackers are using a different technique to spread malware through Office files – using a new attack vector called ‘Dynamic Data Exchange (DDE)’. DDE is an authorized Microsoft Office feature that provides several...Estimated reading time: 3 minutes
Cyber-crime is being widely discussed as a critical topic holding global relevance. In the professional discourse, it is essential that businesses, government-specific entities, and even citizens are vigilant enough when it comes to avoiding the potential threats. This also...