Vulnerabilities found in Broadcom Wi-Fi adapter of Lenovo laptop chipsets

Lenovo recently released an advisory, warning customers about two critical Broadcom vulnerabilities which impact 25 models of its popular ThinkPad lineup. The Broadcom Wi-Fi chipsets used by Lenovo ThinkPad devices are affected by the CVE-2017-11120 & CVE-2017-11121 vulnerabilities. Both these issues are rated as “critical” and received a CVSS 10 score which means they are highly […]

Malspam campaigns exploiting recent MS Office vulnerability ‘CVE-2017-11882’ – An Analysis by Quick Heal Security Labs

No wonder malspam campaigns are a major medium to spread malware. Previously, we have written about such campaigns making use of MS Office malware such as malicious macro, CVE-2017-0199, CVE-2017-8759 and DDE-based attack. Recently, we have started observing various malspam campaigns exploiting the latest MS Office vulnerability CVE-2017-11882. Let’s take a look at in-depth analysis of one […]

CVE-2018-4878 – Adobe Flash Player use after free (Zero Day) vulnerability Alert!

The recent zero-day vulnerability CVE-2018-4878 in Adobe Flash Player enables attackers to perform a Remote Code Execution on targeted machines. Adobe has released a security advisory APSA18-01 on February 2, 2018 to address this issue. According to Adobe, the in-wild attack is targeted and it impacts limited Windows users. Vulnerable versions Adobe Flash Player 28.0.0.137 […]

Machine learning approach for advanced threat hunting

In today’s fast-changing world, the cyber threat landscape is getting increasingly complex and signature-based systems are falling behind to protect endpoints. All major security solutions are built with layered security models to protect endpoints from today’s advanced threats. Machine learning-based detection is also becoming an inevitable component of these layered security models. In this post, […]

Web_filtering_Quick_Heal

How Web Filtering secures your digital world

What is web filtering? Web filtering, also known as content filtering and URL filtering, restricts access to certain websites which may be harmful if opened or accessed. This feature not only helps protect a user’s device but also helps implement certain policies for an organization. Web filtering works on two important criteria to filter or […]

WhatsApp_Scam_Alert

WhatsApp Scam Alert! Do not be fooled by this new scam

This is a quick advisory to warn our readers about a new WhatsApp scam that is afoot. In this scam, a fake message is getting circulated which informs a user that their WhatsApp subscription has expired and that they can buy a lifetime service just for 99p by clicking on a link. Clicking on this […]

In-browser Cryptojacking at full throttle – A report by Quick Heal Security Labs

Cryptocurrencies like Bitcoin, Monero, Ethereum, Litecoin, and Tezos are in full swing. And they have exponentially increased cryptocurrency mining (or cryptomining) activities. Previously, cryptomining was carried out by powerful and dedicated mining hardware or by utilizing distributed computing because the entire process requires a lot of computation. However, there has been an observable change in the mining trends. Now, web browsers are taking part in cryptomining and its activity is growing because the computing power used in […]

Here’s how you can stay safe from the Android Banking Trojan that targets banking apps

If our readers can recollect, Quick Heal Security Labs had released an important advisory about an Android banking Trojan that is known to target about 232 banking apps. As a continuation of the post, here we will help you understand how you can protect yourself from this malware by following some simple security measures. First, […]

What do we need to know about the CPU vulnerabilities Meltdown and Spectre?

What exactly is a vulnerability? A security vulnerability (also known as a security hole) is a security flaw detected in a product that may leave it open to hackers and malware. Using such vulnerabilities, attackers can exploit the affected system/product for their profit in various ways. What is an exploit? Exploits are attacks performed on a […]