• News
  • Security
  • Products
  • About Seqrite
Blogs on Information Technology, Network & Cybersecurity | Seqrite Blog
  • News
  • Security
  • Products
  • About Seqrite

Malware Archive

Again! A New .NET Ransomware Shrug2

Again! A New .NET Ransomware Shrug2

Estimated reading time: 5 minutes

For several months, Quick Heal Security Labs has been observing an increase in ransomware which are built in  .NET framework. Ransomware like SamSam, Lime and now Shrug was found to be built in .NET framework. Malware authors are finding it very easy to build...
Read Blog
August 10, 2018

The evolution of a 4-year-old-threat Emotet: From an infamous Trojan to a complex threat distributer

The evolution of a 4-year-old-threat Emotet: From an infamous Trojan to a complex threat distributer

Estimated reading time: 6 minutes

Emotet malware campaign has been existing for a long time. It comes frequently in intervals with different techniques and variants to deliver malware on a victim. Attackers are smart and they use complex techniques to avoid detection. At the...
Read Blog
July 25, 2018
1

Your copy-paste habit can cost you your money

Your copy-paste habit can cost you your money

Estimated reading time: 4 minutes

How often do you store your important data in files? It’s very common, right? This data may be URLs, topics, personal data like contacts, email-ids, usernames of different portals and sometimes passwords too (though always recommended to not to...
Read Blog
July 19, 2018
5
Shares

A new ransom-miner malware campaign emerging in wild!

A new ransom-miner malware campaign emerging in wild!

Estimated reading time: 5 minutes

Since the past few weeks, Quick Heal Security Labs has been observing a series of interesting malware blocked at our customer end. The further analysis of the malware ‘t.exe’ revealed that the malware seems to be Trojan dropper. Interestingly,...
Read Blog
July 11, 2018

Cryptojacking: FAQs for Businesses

Cryptojacking: FAQs for Businesses

Estimated reading time: 3 minutes

If ransomware, malware, hacking and data loss weren’t enough for India’s cybersecurity space, it has now got another problem to deal with. On 11 May, 2018, it was widely reported that India had just seen a major cryptojacking attack. More than...
Read Blog
June 26, 2018
10
Shares

CVE-2018-5002 – Adobe Flash Player Stack Buffer Overflow Vulnerability Alert!

CVE-2018-5002 – Adobe Flash Player Stack Buffer Overflow Vulnerability Alert!

Estimated reading time: < 1 minute

The recent zero-day vulnerability CVE-2018-5002 in Adobe Flash Player enables attackers to perform a Remote Code Execution on targeted machines. Adobe has released a security advisory APSB18-19 on June 7, 2018 to address this issue. According to Adobe, the...
Read Blog
June 8, 2018

An analysis of the Dharma ransomware outbreak by Quick Heal Security Labs

An analysis of the Dharma ransomware outbreak by Quick Heal Security Labs

Estimated reading time: 6 minutes

On April 25, 2018, Quick Heal Security Labs issued an advisory on a new ransomware outbreak. We are observing a sudden spike of Dharma Ransomware. Even though Dharma ransomware is old, we observed its new variant which is encrypting...
Read Blog
May 2, 2018

What is ‘fileless malware’ and why it could be the biggest threat to your business?

What is ‘fileless malware’ and why it could be the biggest threat to your business?

Estimated reading time: 2 minutes

What is a fileless malware? First, let’s understand how a traditional antivirus works: During a malware attack, a malicious executable file or a script is placed on the computer’s hard drive. The antivirus gets into action and analyzes this...
Read Blog
April 24, 2018
3
Shares
1

An in-depth analysis of a new, emerging “.url” malware campaign

An in-depth analysis of a new, emerging “.url” malware campaign

Estimated reading time: 5 minutes

Last week, we had blogged about the emergence of a new attack vector ‘.url’ which is used to spread malware. In this blog post, we will deep-dive into the attack chain of this ‘.url’ vector and elaborate on the...
Read Blog
March 19, 2018
5
Shares

MIRUS – a cryptomining virus

MIRUS – a cryptomining virus

Estimated reading time: 4 minutes

Cryptocurrencies are all the vogue now. This has resulted in the emergence of increasing cryptocurrency mining activities. Several platforms make mining services available to users. One such platform that provides JavaScript cryptocurrency miners for websites is CoinHive. Recently, we have...
Read Blog
March 9, 2018
1
Share
← Previous 1 … 5 6 7 … 9 Next →
Featured Authors
  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director of Quick Heal Technologies...

    Read more..
  • Mahua Chakrabarthy
    Mahua Chakrabarthy

    A tea connoisseur who firmly believes that life is too short for dull content....

    Read more..
Topics
apt (19) Cyber-attack (35) cyber-attacks (58) cyberattack (16) cyberattacks (13) Cybersecurity (323) cyber security (31) Cyber threat (33) cyber threats (48) Data (11) data breach (55) data breaches (28) data loss (28) data loss prevention (34) data privacy (11) data protection (24) data security (15) DLP (49) Encryption (16) endpoint security (107) Enterprise security (17) Exploit (14) firewall (11) GDPR (12) hackers (11) malware (76) malware attack (23) malware attacks (12) MDM (25) Microsoft (15) Network security (22) Patch Management (12) phishing (27) Ransomware (67) ransomware attack (30) ransomware attacks (30) ransomware protection (13) security (11) Seqrite (33) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (16) windows (11)
Loading
Resources
  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies
About Us
  • About Seqrite
  • Leadership
  • Awards & Certifications
  • Newsroom
Archives
  • By Date
  • By Category
Loading

© 2025 Quick Heal Technologies Ltd. Cookie Policies Privacy Policies