• News
  • Security
  • Products
  • About Seqrite
Blogs on Information Technology, Network & Cybersecurity | Seqrite Blog
  • News
  • Security
  • Products
  • About Seqrite
Home  /  Author
Bajrang Mane

About Bajrang Mane

Bajrang Mane is leading the Threat Analysis, Incident response, and Automation teams in Quick Heal Security Labs. Having spent 13 years in the IT security industry, he has worked on various aspects of malware analysis and its detection.

GandCrab Riding Emotet’s Bus!

GandCrab Riding Emotet’s Bus!

Estimated reading time: 4 minutes

Emotet Known for constantly changing its payload and infection vectors like spam mail, Malicious Doc and even Malicious JS files. It compromised a very high number of websites on the internet. Emotet malware campaign has existed since 2014. It comes...
Read Blog
February 15, 2019
10
Shares

Beware! Your website might be delivering Emotet malware

Beware! Your website might be delivering Emotet malware

Estimated reading time: 10 minutes

In 2018, we saw a surge in Emotet activity. Emotet started as a banking trojan but this blog will shed light on how it has also become a “threat distributor”. We will also discuss server-side and client-side activity and...
Read Blog
December 29, 2018
15
Shares

An analysis of the Dharma ransomware outbreak by Quick Heal Security Labs

An analysis of the Dharma ransomware outbreak by Quick Heal Security Labs

Estimated reading time: 6 minutes

On April 25, 2018, Quick Heal Security Labs issued an advisory on a new ransomware outbreak. We are observing a sudden spike of Dharma Ransomware. Even though Dharma ransomware is old, we observed its new variant which is encrypting...
Read Blog
May 2, 2018

Beware! A new .Net Ransomware is encrypting files with .Lime

Beware! A new .Net Ransomware is encrypting files with .Lime

Estimated reading time: 4 minutes

Cases of the “Lime ransomware” have been recently reported to Quick Heal Security Labs. Our research team has analyzed these cases deeply and found some useful information. This post shares this information to help users stay safe from ransomware...
Read Blog
March 6, 2018
1
Share

Beware of fake cryptocurrency mining apps – a report by Quick Heal Security Labs

Beware of fake cryptocurrency mining apps – a report by Quick Heal Security Labs

Estimated reading time: 4 minutes

Cryptocurrency has become a famous and valuable digital asset. One of the ways to earn cryptocurrencies is to mine them. New coins are generated and brought into the market through the process of mining. Mining of cryptocurrency is a...
Read Blog
January 18, 2018
6
Shares

Android ransomware demands iTunes gift cards as a ransom – an analysis by Quick Heal Security Labs

Android ransomware demands iTunes gift cards as a ransom – an analysis by Quick Heal Security Labs

Estimated reading time: 4 minutes

Typically, a ransomware will demand money or cryptocurrency after it has locked down your computer or phone or encrypted its data. But, Quick Heal Security Labs has spotted an Android ransomware that demands iTunes gift cards after it locks...
Read Blog
December 12, 2017

IcedID – a new sophisticated banking Trojan: a technical analysis by Quick Heal Security Labs

IcedID – a new sophisticated banking Trojan: a technical analysis by Quick Heal Security Labs

Estimated reading time: 3 minutes

IcedID is a new player in the banking Trojan family. It has a modular architecture and capable of stealing banking credentials of the user by performing a man-in-the-middle attack (MITM). IcedID sets up a local proxy and redirects all...
Read Blog
December 1, 2017
Featured Authors
  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director of Quick Heal Technologies...

    Read more..
  • Mahua Chakrabarthy
    Mahua Chakrabarthy

    A tea connoisseur who firmly believes that life is too short for dull content....

    Read more..
Topics
apt (19) Cyber-attack (35) cyber-attacks (58) cyberattack (16) cyberattacks (13) Cybersecurity (322) cyber security (31) Cyber threat (33) cyber threats (48) Data (11) data breach (55) data breaches (28) data loss (28) data loss prevention (34) data privacy (11) data protection (24) data security (15) DLP (49) Encryption (16) endpoint security (107) Enterprise security (17) Exploit (14) firewall (11) GDPR (12) hackers (11) malware (76) malware attack (23) malware attacks (12) MDM (25) Microsoft (15) Network security (22) Patch Management (12) phishing (27) Ransomware (67) ransomware attack (30) ransomware attacks (30) ransomware protection (13) security (11) Seqrite (33) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (16) windows (11)
Loading
Resources
  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies
About Us
  • About Seqrite
  • Leadership
  • Awards & Certifications
  • Newsroom
Archives
  • By Date
  • By Category
Loading

© 2025 Quick Heal Technologies Ltd. Cookie Policies Privacy Policies