• News
  • Security
  • Products
  • About Seqrite
Blogs on Information Technology, Network & Cybersecurity | Seqrite Blog
  • News
  • Security
  • Products
  • About Seqrite

Malware Archive

Lessons security professionals should learn from the year 2017

Lessons security professionals should learn from the year 2017

Estimated reading time: 4 minutes

2017 has been a year of several high-profile cyber-attacks with an excruciatingly large number of breaches originating from third-party software modules and compromised accounts. With hackers constantly trying to gain access to confidential data sets, it is important to...
Read Blog
December 20, 2017

Biggest cyber attacks in 2017

Biggest cyber attacks in 2017

Estimated reading time: 4 minutes

Cybersecurity was undoubtedly one of the most influential areas of technology in 2017. The year witnessed an inordinate number of cybersecurity meltdowns globally. Let us look at some of the biggest cyber-attacks of 2017 that shook the world. 1....
Read Blog
December 11, 2017
99
Shares

How hackers name malware and vulnerabilities?

How hackers name malware and vulnerabilities?

Estimated reading time: 3 minutes

Although there aren’t many predefined standards for naming malware and vulnerabilities, they are often segregated according to the genre, impact and even malicious functionalities. Moreover, giving unique names to the vulnerabilities is nearly impossible due to the expansive conglomerate...
Read Blog
December 7, 2017

An emerging trend of DDE based Office malware

An emerging trend of DDE based Office malware

Estimated reading time: 3 minutes

For the past few years, we have been seeing macro-based attacks through Object Linking Embedding (OLE)/Microsoft Office files. But, presently, attackers are using a different technique to spread malware through Office files – using a new attack vector called ‘Dynamic Data Exchange (DDE)’. DDE is an authorized Microsoft Office feature that provides several...
Read Blog
December 6, 2017
2
Shares

The Cyber Threat Landscape 2017

The Cyber Threat Landscape 2017

Estimated reading time: 3 minutes

Cyber threats are multiplying at an uncontrollable rate and 2017 hasn’t been any different. While global damages, concerning cybersecurity, are expected to surpass $5 billion by the end of this year, the actual predicament is the supposed yearly growth which...
Read Blog
December 4, 2017
2
Shares

IcedID – a new sophisticated banking Trojan: a technical analysis by Quick Heal Security Labs

IcedID – a new sophisticated banking Trojan: a technical analysis by Quick Heal Security Labs

Estimated reading time: 3 minutes

IcedID is a new player in the banking Trojan family. It has a modular architecture and capable of stealing banking credentials of the user by performing a man-in-the-middle attack (MITM). IcedID sets up a local proxy and redirects all...
Read Blog
December 1, 2017

Massive campaign delivering Monero Miner via compromised websites!

Massive campaign delivering Monero Miner via compromised websites!

Estimated reading time: 4 minutes

Ransomware outbreaks have been on the rise for quite some time now but suddenly we are observing a change in this trend.  Seems like the rise observed in cryptocurrency valuations especially for Bitcoins is making attackers to go after...
Read Blog
November 24, 2017

Top 5 most wanted cybercriminals across the globe

Top 5 most wanted cybercriminals across the globe

Estimated reading time: 3 minutes

Cyber-crime is being widely discussed as a critical topic holding global relevance. In the professional discourse, it is essential that businesses, government-specific entities, and even citizens are vigilant enough when it comes to avoiding the potential threats. This also...
Read Blog
November 13, 2017

New breeds of ransomware: Who’s at risk?

New breeds of ransomware: Who’s at risk?

Estimated reading time: 3 minutes

While ransomware threats keep bothering businesses regardless of their stature and size, organizations are slowly but steadily resorting to proactivity, to prevent infections and potential sabotages. The most frightening aspect of ransomware attacks is the evolution and sophistication on...
Read Blog
November 9, 2017

Protect your files or pay ransom: What will you choose?

Protect your files or pay ransom: What will you choose?

Estimated reading time: 3 minutes

Believe it or not, traditional cyber-criminals are slowly abandoning the obsolete techniques of making money-courtesy the growing popularity of ransomware attacks. The latter is a lucrative crime operation which plagues every business, regardless of its spread. Cyber extortionists keep...
Read Blog
October 24, 2017
← Previous 1 … 7 8 9 Next →
Featured Authors
  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director of Quick Heal Technologies...

    Read more..
  • Mahua Chakrabarthy
    Mahua Chakrabarthy

    A tea connoisseur who firmly believes that life is too short for dull content....

    Read more..
Topics
apt (19) Cyber-attack (35) cyber-attacks (58) cyberattack (16) cyberattacks (13) Cybersecurity (323) cyber security (31) Cyber threat (33) cyber threats (48) Data (11) data breach (55) data breaches (28) data loss (28) data loss prevention (34) data privacy (11) data protection (24) data security (15) DLP (49) Encryption (16) endpoint security (107) Enterprise security (17) Exploit (14) firewall (11) GDPR (12) hackers (11) malware (76) malware attack (23) malware attacks (12) MDM (25) Microsoft (15) Network security (22) Patch Management (12) phishing (27) Ransomware (67) ransomware attack (30) ransomware attacks (30) ransomware protection (13) security (11) Seqrite (33) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (16) windows (11)
Loading
Resources
  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies
About Us
  • About Seqrite
  • Leadership
  • Awards & Certifications
  • Newsroom
Archives
  • By Date
  • By Category
Loading

© 2025 Quick Heal Technologies Ltd. Cookie Policies Privacy Policies