antivirus updates

Tech Optimizer
February 11, 2026
MicroWorld Technologies confirmed a breach of its eScan antivirus update infrastructure, allowing attackers to deliver a malicious downloader to enterprise and consumer systems. Unauthorized access was detected, leading to the isolation of affected update servers for over eight hours. A patch was released to revert the changes made by the malicious update, and impacted organizations were advised to contact MicroWorld for assistance. The attack occurred on January 20, 2026, when a compromised update was distributed within a two-hour window. The malicious payload, introduced through a rogue "Reload.exe" file, hindered eScan's functionality, blocked updates, and contacted an external server for additional payloads. This rogue executable was signed with a fake digital signature and employed techniques to evade detection. It also included an AMSI bypass capability and assessed whether to deliver further payloads based on the presence of security solutions. The malicious "CONSCTLX.exe" altered the last update time of eScan to create a false sense of normalcy. The attack primarily targeted machines in India, Bangladesh, Sri Lanka, and the Philippines, highlighting the rarity and seriousness of supply chain attacks through antivirus products.
Tech Optimizer
June 28, 2024
- Regularly update antivirus software to protect against latest threats - Scan computer for malware regularly - Update operating system and applications to reduce vulnerabilities - Remove unnecessary applications to enhance security - Use a high quality VPN to encrypt internet connection and conceal IP address
Tech Optimizer
June 21, 2024
Kaspersky, a Russia-based cybersecurity firm, denies allegations that its activities pose a threat to U.S. national security and plans to explore legal options to continue its operations in response to a ban on the sale of its antivirus products in the United States.
Search