Technical Papers

Technical Papers

This section is dedicated to papers that are based on experiments and practice of germane issues regarding security. Some of these papers have been presented at international security seminars and technical conferences. The range of papers are aimed at system administrators, security specialists or academicians interested in understanding the issues.
Cuba Ransomware: Taking the Cyber world by Storm

Cuba Ransomware: Taking the Cyber world by Storm

Rapidly expanding its attack tactics, The Cuba Ransomware group is seeking out any vulnerabilities and flaws that it can find. Learn more about it and also find out how best you ca...
Apr 4, 2023, 5:53:11 AM
Warning: Linux Royal Ransomware Targets VMware ESXi

Warning: Linux Royal Ransomware Targets VMware ESXi

Ransomware attacks have seen a steady rise over the past years, and experts predict that this trend will continue to extend to its variations and frequency as well. In this analysi...
Mar 14, 2023, 7:06:58 AM
Decryptme Ransomware

Decryptme Ransomware

With an increase in ransomware built in the .NET framework, this ransomware adds file extensions containing the DecryptMe string. We will discuss here more about the DecryptMe Rans...
Jul 25, 2022, 7:19:21 AM
Threat Intelligence

Threat Intelligence

Threat intelligence has been evolving as a term for a decade, but how is it preventing data breaches? This paper highlights how Threat Intel can help companies identify the threats...
Jul 19, 2022, 3:39:15 AM
DARKSIDE 2.1.2.3 RANSOMWARE

DARKSIDE 2.1.2.3 RANSOMWARE

The Darkside ransomware attack campaigns stood out for their use of stealthy techniques, especially in the early stages. Because of its potential impact, we detail here the mechani...
Jun 1, 2022, 3:34:30 AM
Deconstructing RansomExx aka Defray777 Ransomware  Memory run fileless malware

Deconstructing RansomExx aka Defray777 Ransomware Memory run fileless malware

RansomExx is a ransomware family that targeted multiple companies in the past years. It is a Trojan-based ransomware strain that uses email as its delivery method. This paper highl...
May 30, 2022, 9:36:58 AM
Android Accessibility

Android Accessibility

Android Accessibility Features is an all-new way to have a conversation. Designed for people with disabilities, the features are a boon making digital media accessible with just a ...
Jun 30, 2021, 6:56:01 AM
Quick Heal's Web Filtering Service

Quick Heal's Web Filtering Service

Quick Heals Web Filtering Service provide the most effective way to block access to unwanted content and protect users against web-based threats using real-time, Deep learning-base...
Nov 3, 2020, 6:41:50 AM
The Evolution of Fake Apps

The Evolution of Fake Apps

The rapid surge in FakeApps on Android Platforms has been a problem point, for both, Google as well as its consumers. Find out The various channels through which FakeApps enter use...
Jul 15, 2020, 1:53:05 PM
Behaviors based detection for files infectors

Behaviors based detection for files infectors

The proliferation of complex and sophisticated malware requires more than the current heuristic detections that are used by traditional anti-virus software. This paper is an insigh...
Apr 23, 2020, 2:37:56 AM
Introduction to malware and malware analysis

Introduction to malware and malware analysis

This paper systematically gives an introduction to the varieties of samples that come under the scope of malware, their distinguishing features, prerequisites for malware analysis ...
Apr 23, 2020, 2:37:14 AM
Web Browser Sandboxing: Security Against Web Attacks

Web Browser Sandboxing: Security Against Web Attacks

The evolution of web attacks and their vulnerabilities, the need for a Sandbox environment and its progress were the topics that were studied and presented in this paper.   ...
Apr 23, 2020, 2:36:18 AM
Automated Malware (mis)Classification and Challenges

Automated Malware (mis)Classification and Challenges

This paper talks about Quick Heals study regarding Anti-Malware and Automated Malware Classification. It also discusses the preventive measures against Automated Malware.   ...
Apr 23, 2020, 2:35:34 AM
EternalBlue - A Prominent Threat Actor of 2017-2018

EternalBlue - A Prominent Threat Actor of 2017-2018

This Technical paper outlines the usage of the Fuzzbunch exploit framework, details of MS17-010 patch, and insights into the EternalBlue exploit and DoublePulsar payload.
Apr 23, 2020, 2:29:25 AM
The Complete story of EMOTET

The Complete story of EMOTET

Emotet started as a banking trojan but this paper will shed light on how it has also become a "threat distributor". We will also discuss server-side and client-side activity and ho...
Apr 23, 2020, 2:25:34 AM
Load More
Share Idea

HAVE AN IDEA FOR US TO IMPROVE?

SHARE YOUR IDEA
Partners

WANT TO BE A PART OF OUR GROWTH?

Partner (Retail/Affiliate) with Us

SUPPORT

1800 121 7377

SUBSCRIBE TO NEWSLETTER

FOLLOW US