• News
  • Security
  • Products
  • About Seqrite
Blogs on Information Technology, Network & Cybersecurity | Seqrite Blog
  • News
  • Security
  • Products
  • About Seqrite
Home  /  Author
Pradeep Kulkarni

About Pradeep Kulkarni

Pradeep Kulkarni is leading the IPS team in Quick Heal Technologies Limited. Having worked in the IT security industry for over 11 years, he has worked on various security products and has a keen interest in writing blog posts on trends observed during his research.

Obfuscated Equation Editor Exploit (CVE-2017-11882) spreading Hawkeye Keylogger

Obfuscated Equation Editor Exploit (CVE-2017-11882) spreading Hawkeye Keylogger

Estimated reading time: 6 minutes

Cyber-attacks through phishing emails are increasing and generally, attackers use DOC embedded macros to infiltrate victim’s machine. Recently Quick Heal Security Labs came across a Phishing e-mail sample which uses Microsoft’s equation editor exploit to spread Hawkeye keylogger. Cybercriminals...
Read Blog
November 1, 2018
5
Shares

An in-depth analysis of a new, emerging “.url” malware campaign

An in-depth analysis of a new, emerging “.url” malware campaign

Estimated reading time: 5 minutes

Last week, we had blogged about the emergence of a new attack vector ‘.url’ which is used to spread malware. In this blog post, we will deep-dive into the attack chain of this ‘.url’ vector and elaborate on the...
Read Blog
March 19, 2018
5
Shares

CVE-2018-4878 – Adobe Flash Player use after free (Zero Day) vulnerability Alert!

CVE-2018-4878 – Adobe Flash Player use after free (Zero Day) vulnerability Alert!

Estimated reading time: < 1 minute

The recent zero-day vulnerability CVE-2018-4878 in Adobe Flash Player enables attackers to perform a Remote Code Execution on targeted machines. Adobe has released a security advisory APSA18-01 on February 2, 2018 to address this issue. According to Adobe, the...
Read Blog
February 3, 2018

Seqrite thwarts attempts of a JAVA jRAT phishing campaign targeting an international embassy in India

Seqrite thwarts attempts of a JAVA jRAT phishing campaign targeting an international embassy in India

Estimated reading time: 3 minutes

Earlier we had blogged about how JAVA based jRAT malware were evolved in the recent times. At Quick Heal Security Labs, we are actively observing jRAT campaigns happening in the wild. These JAVA malware spread through phishing campaigns. While analyzing one such phishing campaign, we found...
Read Blog
January 16, 2018
4
Shares

Massive campaign delivering Monero Miner via compromised websites!

Massive campaign delivering Monero Miner via compromised websites!

Estimated reading time: 4 minutes

Ransomware outbreaks have been on the rise for quite some time now but suddenly we are observing a change in this trend.  Seems like the rise observed in cryptocurrency valuations especially for Bitcoins is making attackers to go after...
Read Blog
November 24, 2017

A recent .NET Framework zero day Vulnerability (CVE-2017-8759) is dropping Infostealer malware- An analysis by Quick Heal Security Labs

A recent .NET Framework zero day Vulnerability (CVE-2017-8759) is dropping Infostealer malware- An analysis by Quick Heal Security Labs

Estimated reading time: 4 minutes

.NET Framework Remote Code Execution Vulnerability (CVE-2017-8759) is a code injection vulnerability in the SOAP WSDL parser of .net framework. This vulnerability was a zero-day when it was spotted in the wild. Quick Heal Security Labs had released advisory in the month of...
Read Blog
October 16, 2017

CVE-2017-11826 – Microsoft Office Memory Corruption Vulnerability – Alert!

CVE-2017-11826 – Microsoft Office Memory Corruption Vulnerability – Alert!

Estimated reading time: < 1 minute

The recent zero-day vulnerability in Microsoft Office vulnerability CVE-2017-11826 enables attackers to perform a Remote Code Execution on targeted machines. According to a recently published blog post, this vulnerability is being exploited in the wild. Microsoft has released a security update on October 10, 2017,...
Read Blog
October 13, 2017

CVE-2017-9805 – Apache Struts 2 Remote Code Execution Vulnerability

CVE-2017-9805 – Apache Struts 2 Remote Code Execution Vulnerability

Estimated reading time: 2 minutes

A critical remote code execution vulnerability has been discovered in famous web application framework Apache Struts, which allows attackers to execute arbitrary code. To address this issue, Apache Struts has issued a security advisory and CVE-2017-9805 has been assigned...
Read Blog
September 7, 2017

RIG Exploit Kit’s pre-landing page is still the same

RIG Exploit Kit’s pre-landing page is still the same

Estimated reading time: 2 minutes

Exploit Kits are dynamic in nature particularly in terms of their delivery mechanism. Their landing page i.e., the content is obfuscated and changed frequently in order to evade various security software. The RIG Exploit Kit, however, has a different...
Read Blog
July 7, 2017

A technical analysis of the recent Petya ransomware attack

A technical analysis of the recent Petya ransomware attack

Estimated reading time: 4 minutes

Earlier this week, a new variant of Petya Ransomware was spotted which was creating havoc all over Europe as well as major parts of Asia including India. The major target for Petya has been Ukraine as its major banks...
Read Blog
June 30, 2017
1 2 Next →
Featured Authors
  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director of Quick Heal Technologies...

    Read more..
  • Mahua Chakrabarthy
    Mahua Chakrabarthy

    A tea connoisseur who firmly believes that life is too short for dull content....

    Read more..
Topics
apt (19) Cyber-attack (35) cyber-attacks (58) cyberattack (16) cyberattacks (13) Cybersecurity (322) cyber security (31) Cyber threat (33) cyber threats (48) Data (11) data breach (55) data breaches (28) data loss (28) data loss prevention (34) data privacy (11) data protection (24) data security (15) DLP (49) Encryption (16) endpoint security (107) Enterprise security (17) Exploit (14) firewall (11) GDPR (12) hackers (11) malware (76) malware attack (23) malware attacks (12) MDM (25) Microsoft (15) Network security (22) Patch Management (12) phishing (27) Ransomware (67) ransomware attack (30) ransomware attacks (30) ransomware protection (13) security (11) Seqrite (33) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (16) windows (11)
Loading
Resources
  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies
About Us
  • About Seqrite
  • Leadership
  • Awards & Certifications
  • Newsroom
Archives
  • By Date
  • By Category
Loading

© 2025 Quick Heal Technologies Ltd. Cookie Policies Privacy Policies