• News
  • Security
  • Products
  • About Seqrite
Blogs on Information Technology, Network & Cybersecurity | Seqrite Blog
  • News
  • Security
  • Products
  • About Seqrite

Cryptocurrency Archive

Demystifying PKT and Monero Cryptocurrency deployed on MSSQL servers

Demystifying PKT and Monero Cryptocurrency deployed on MSSQL servers

Estimated reading time: 8 minutes

Demystifying PKT and Monero Cryptocurrency deployed on MSSQL servers The world is rapidly transitioning into the digital age, reshaping how we communicate, work, and conduct financial transactions. This shift is driven by advancements in technology, increased internet accessibility, and...
Read Blog
February 20, 2025

Cryptocurrency Malware: Bitcoin Mining threats you need to know about

Cryptocurrency Malware: Bitcoin Mining threats you need to know about

Estimated reading time: 2 minutes

The entire world’s eyes are on Bitcoin right now since the cryptocurrency’s valuation touched an all-time high. The world’s oldest cryptocurrency is currently being valued at close to USD 40,000, a valuation that is almost a quadruple rise in just a...
Read Blog
April 4, 2021

Hackers steal e-commerce databases, demand Bitcoin as ransom.

Hackers steal e-commerce databases, demand Bitcoin as ransom.

Estimated reading time: 2 minutes

E-commerce platforms have always been a favourite target for hackers. The recent months have brought into attention a new campaign by malicious hackers to penetrate insecure servers of e-commerce platforms, steal their databases and then demand Bitcoin to return...
Read Blog
July 16, 2020

Defending businesses from the perils of Cryptojacking

Defending businesses from the perils of Cryptojacking

Estimated reading time: 2 minutes

The last few years have given rise to a new & dangerous cyberthreat known as cryptojacking which is unlike typical malware — it does not demand ransom, spy or cripple enterprise systems or cause loss of data. We introduced...
Read Blog
January 6, 2020

BlueKeep Attacks seen in the wild!

Estimated reading time: 2 minutes

CVE-2019-0708, popularly known as BlueKeep, is a RDP pre-authentication vulnerability which allows attacker to compromise a vulnerable system without user’s interaction. This exploit is also wormable, meaning that it can spread to other vulnerable systems in a similar way...
Read Blog
November 8, 2019

Miners snatching open source tools to strengthen their malevolent power!

Miners snatching open source tools to strengthen their malevolent power!

Estimated reading time: 9 minutes

From the last one year, Quick Heal Security Labs has been observing a boost in the number of mining malware. One of the ways to earn cryptocurrencies is to mine them. Nowadays cryptocurrency miner malware have become hot attack...
Read Blog
April 26, 2019

Again! A New .NET Ransomware Shrug2

Again! A New .NET Ransomware Shrug2

Estimated reading time: 5 minutes

For several months, Quick Heal Security Labs has been observing an increase in ransomware which are built in  .NET framework. Ransomware like SamSam, Lime and now Shrug was found to be built in .NET framework. Malware authors are finding it very easy to build...
Read Blog
August 10, 2018

Your copy-paste habit can cost you your money

Your copy-paste habit can cost you your money

Estimated reading time: 4 minutes

How often do you store your important data in files? It’s very common, right? This data may be URLs, topics, personal data like contacts, email-ids, usernames of different portals and sometimes passwords too (though always recommended to not to...
Read Blog
July 19, 2018
5
Shares

Blockchain: A brief introduction

Blockchain: A brief introduction

Estimated reading time: 3 minutes

Cryptocurrency is not just a fad anymore – it is a reality. Almost every day, there’s a new headline about Bitcoin and its recent surge or fall. And many of these articles use terms which might sound alien. One...
Read Blog
June 15, 2018

Anonymous Cryptocurrency: Introduction to new security challenges

Anonymous Cryptocurrency: Introduction to new security challenges

Estimated reading time: 3 minutes

While the existing crypto-sphere is already plagued by issues concerning scalability, financial privacy is fast shaping us yet another prerequisite to sizeable investments. Individuals are constantly emphasizing on anonymous cryptocurrencies courtesy the flexibilities on offer. That said, we believe...
Read Blog
March 12, 2018
1 2 Next →
Featured Authors
  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director of Quick Heal Technologies...

    Read more..
  • Mahua Chakrabarthy
    Mahua Chakrabarthy

    A tea connoisseur who firmly believes that life is too short for dull content....

    Read more..
Topics
apt (19) Cyber-attack (35) cyber-attacks (58) cyberattack (16) cyberattacks (13) Cybersecurity (322) cyber security (31) Cyber threat (33) cyber threats (48) Data (11) data breach (55) data breaches (28) data loss (28) data loss prevention (34) data privacy (11) data protection (24) data security (15) DLP (49) Encryption (16) endpoint security (107) Enterprise security (17) Exploit (14) firewall (11) GDPR (12) hackers (11) malware (76) malware attack (23) malware attacks (12) MDM (25) Microsoft (15) Network security (22) Patch Management (12) phishing (27) Ransomware (67) ransomware attack (30) ransomware attacks (30) ransomware protection (13) security (11) Seqrite (33) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (16) windows (11)
Loading
Resources
  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies
About Us
  • About Seqrite
  • Leadership
  • Awards & Certifications
  • Newsroom
Archives
  • By Date
  • By Category
Loading

© 2025 Quick Heal Technologies Ltd. Cookie Policies Privacy Policies