• News
  • Security
  • Products
  • About Seqrite
Blogs on Information Technology, Network & Cybersecurity | Seqrite Blog
  • News
  • Security
  • Products
  • About Seqrite

Malware Archive

Beware! A new .Net Ransomware is encrypting files with .Lime

Beware! A new .Net Ransomware is encrypting files with .Lime

Estimated reading time: 4 minutes

Cases of the “Lime ransomware” have been recently reported to Quick Heal Security Labs. Our research team has analyzed these cases deeply and found some useful information. This post shares this information to help users stay safe from ransomware...
Read Blog
March 6, 2018
1
Share

The Runner: a key component of the SamSam ransomware campaign – An analysis by Quick Heal Security Labs

The Runner: a key component of the SamSam ransomware campaign – An analysis by Quick Heal Security Labs

Estimated reading time: 4 minutes

In Jan 2018, Greenfield, Indiana-based Hancock Health (healthcare network) was attacked by SamSam ransomware. It encrypted the files containing patients’ data which disrupted their critical services. Even though SamSam is not a new ransomware, it has evolved over a...
Read Blog
February 8, 2018
4
Shares

Malspam campaigns exploiting recent MS Office vulnerability ‘CVE-2017-11882’

Malspam campaigns exploiting recent MS Office vulnerability ‘CVE-2017-11882’

Estimated reading time: 4 minutes

No wonder malspam campaigns are a major medium to spread malware. Previously, we have written about such campaigns making use of MS Office malware such as malicious macro, CVE-2017-0199, CVE-2017-8759 and DDE-based attack. Recently, we have started observing various malspam campaigns...
Read Blog
February 5, 2018
1

CVE-2018-4878 – Adobe Flash Player use after free (Zero Day) vulnerability Alert!

CVE-2018-4878 – Adobe Flash Player use after free (Zero Day) vulnerability Alert!

Estimated reading time: < 1 minute

The recent zero-day vulnerability CVE-2018-4878 in Adobe Flash Player enables attackers to perform a Remote Code Execution on targeted machines. Adobe has released a security advisory APSA18-01 on February 2, 2018 to address this issue. According to Adobe, the...
Read Blog
February 3, 2018

How to defend your network against DDoS attacks?

How to defend your network against DDoS attacks?

Estimated reading time: 3 minutes

When it comes to enlisting the most unrecognizable forms of cyber-attacks, Distributed Denial of Service (DDoS) features on top of the pecking order. While DDoS attacks started off as simple and volumetric threats for creating disruptions, they have amplified...
Read Blog
January 31, 2018

In-browser Cryptojacking at full throttle!

In-browser Cryptojacking at full throttle!

Estimated reading time: 3 minutes

Cryptocurrencies like Bitcoin, Monero, Ethereum, Litecoin, and Tezos are in full swing. And they have exponentially increased cryptocurrency mining (or cryptomining) activities. Previously, cryptomining was carried out by powerful and dedicated mining hardware or by utilizing distributed computing because the entire process requires a lot of computation. However, there has been an observable change in the mining trends. Now,...
Read Blog
January 23, 2018
5
Shares

Beware of fake cryptocurrency mining apps – a report by Quick Heal Security Labs

Beware of fake cryptocurrency mining apps – a report by Quick Heal Security Labs

Estimated reading time: 4 minutes

Cryptocurrency has become a famous and valuable digital asset. One of the ways to earn cryptocurrencies is to mine them. New coins are generated and brought into the market through the process of mining. Mining of cryptocurrency is a...
Read Blog
January 18, 2018
6
Shares

Seqrite thwarts attempts of a JAVA jRAT phishing campaign targeting an international embassy in India

Seqrite thwarts attempts of a JAVA jRAT phishing campaign targeting an international embassy in India

Estimated reading time: 3 minutes

Earlier we had blogged about how JAVA based jRAT malware were evolved in the recent times. At Quick Heal Security Labs, we are actively observing jRAT campaigns happening in the wild. These JAVA malware spread through phishing campaigns. While analyzing one such phishing campaign, we found...
Read Blog
January 16, 2018
4
Shares

Virus Infectors – a perpetual attack vector!

Virus Infectors – a perpetual attack vector!

Estimated reading time: 5 minutes

2017 was the year of ransomware and cryptocurrency miners but we are still seeing infectors posing a prominent attack vector. However, old infectors still remain a significant threat to users. In 2017, we observed a few old infector families...
Read Blog
January 12, 2018
3
Shares

Double Whammy: What happens when one cyber-attack hides under another attack?

Double Whammy: What happens when one cyber-attack hides under another attack?

Estimated reading time: 3 minutes

When it comes to handling the cybersecurity threats, enterprises often concentrate on addressing standalone vulnerabilities and security incidents. Organizations believe that mitigating individual threats can keep catastrophic attacks at bay but the modern threat landscape is way more sophisticated than...
Read Blog
December 21, 2017
4
Shares
← Previous 1 … 6 7 8 9 Next →
Featured Authors
  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director of Quick Heal Technologies...

    Read more..
  • Mahua Chakrabarthy
    Mahua Chakrabarthy

    A tea connoisseur who firmly believes that life is too short for dull content....

    Read more..
Topics
apt (19) Cyber-attack (35) cyber-attacks (58) cyberattack (16) cyberattacks (13) Cybersecurity (323) cyber security (31) Cyber threat (33) cyber threats (48) Data (11) data breach (55) data breaches (28) data loss (28) data loss prevention (34) data privacy (11) data protection (24) data security (15) DLP (49) Encryption (16) endpoint security (107) Enterprise security (17) Exploit (14) firewall (11) GDPR (12) hackers (11) malware (76) malware attack (23) malware attacks (12) MDM (25) Microsoft (15) Network security (22) Patch Management (12) phishing (27) Ransomware (67) ransomware attack (30) ransomware attacks (30) ransomware protection (13) security (11) Seqrite (33) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (16) windows (11)
Loading
Resources
  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies
About Us
  • About Seqrite
  • Leadership
  • Awards & Certifications
  • Newsroom
Archives
  • By Date
  • By Category
Loading

© 2025 Quick Heal Technologies Ltd. Cookie Policies Privacy Policies