Quick Links
Popular Searches
Close
Products
Support
Resources
Downloads
Company
The QR Code Detection and Validation System is an advanced application designed to scan, analyze, and verify QR codes for security and authenticity.
Ransomware attacks have seen a steady rise over the past years, and experts predict that this trend will continue to extend to its variations and frequency as well. In this analysis we will delve into the workings of Royal Ransomware.
The evolution of web attacks and their vulnerabilities, the need for a ‘Sandbox’ environment and its progress were the topics that were studied and presented in this paper.
This paper talks about Quick Heal’s study regarding Anti-Malware and Automated Malware Classification. It also discusses the preventive measures against Automated Malware.
This paper systematically gives an introduction to the varieties of samples that come under the scope of malware, their distinguishing features, prerequisites for malware analysis and an overview of the malware analysis process.000
The proliferation of complex and sophisticated malware requires more than the current heuristic detections that are used by traditional anti-virus software. This paper is an insightful take on the need for behavior-based detection for file infecting vi
Device security is vital as mobile devices face rising cyber threats. A security app must ensure protection against malicious apps, unsafe environments, and unauthorized changes, securing Wi-Fi networks is crucial to prevent attacks.
Rapidly expanding its attack tactics, The Cuba Ransomware group is seeking out any vulnerabilities and flaws that it can find. Learn more about it and also find out how best you can protect yourself from such threats.
With an increase in ransomware built in the .NET framework, this ransomware adds file extensions containing the “DecryptMe” string. We will discuss here more about the DecryptMe Ransomware, which does not leave any footprint to identify itself.
Threat intelligence has been evolving as a term for a decade, but how is it preventing data breaches? This paper highlights how Threat Intel can help companies identify the threats impacting their business.
The Darkside ransomware attack campaigns stood out for their use of stealthy techniques, especially in the early stages. Because of its potential impact, we detail here the mechanisms used by the ransomware so that security teams can better assess thei
The rapid surge in FakeApps on Android Platforms has been a problem point, for both, Google as well as its consumers. Find out The various channels through which FakeApps enter users' phones.
This Technical paper outlines the usage of the Fuzzbunch exploit framework, details of MS17-010 patch, and insights into the EternalBlue exploit and DoublePulsar payload.
Emotet started as a banking trojan but this paper will shed light on how it has also become a "threat distributor". We will also discuss server-side and client-side activity and how it spreads.
Please complete your information below to login.