Estimated reading time: 6 minutes
Cyber-attacks through phishing emails are increasing and generally, attackers use DOC embedded macros to infiltrate victim’s machine. Recently Quick Heal Security Labs came across a Phishing e-mail sample which uses Microsoft’s equation editor exploit to spread Hawkeye keylogger. Cybercriminals...Estimated reading time: 3 minutes
The digital world has opened up a plethora of opportunities for workplaces across the globe. Digital transformation means, among other things, seamless connectivity, the erasure of physical barriers and enterprises that can leverage the freedom of knowledge sharing without...Estimated reading time: 1 minute
The recent zero-day vulnerability CVE-2018-8440 in Windows Task Scheduler enables attackers to perform a privilege elevation on targeted machines. Microsoft has released a security advisory CVE-2018-8440 on September 11, 2018 to address this issue. According to Microsoft, successful exploitation...Estimated reading time: 2 minutes
As cyber-attacks continue to affect businesses, it is banks that are the most lucrative target for cybercriminals. Beyond having their reputation at stake, banks also risk customer’s money and data, amplified regulatory attention and even litigation. The stakes are...