Hybrid work environments, also known as blended or co-working models, are on the rise. They take many different forms but generally refer to workplaces that have some combination of desktop computers, laptop computers, or mobile devices. Because... Read more
The eScan Security Research Team discovered a banking Trojan named Aberebot during our Open-Source Threat Hunting. This Trojan is capable of stealing financial and personal information from infected devices. Advanced anti-reverse engineering tec... Read more
PowerShell was created with the intention of helping system administrators automate tasks and maintain configurations. However, it didn’t take long for attackers to learn that it could be used to carry out offensive activities covertly. Be... Read more
Discovering that you have a virus on your computer and haven’t backed up all your valuable files and photos can be upsetting. Your device can be infected by just one wrong click or bad download. The feeling might lead people to believe the... Read more
Spam Emails: How to Stop Them!
In email terms, spam is an uninvited, bulk-sent message delivered to your inbox. You probably receive both spam and marketing messages on a regular basis, but there’s one significant difference between the two: permission. You’ll rec... Read more