• News
  • Security
  • Products
  • About Seqrite
Blogs on Information Technology, Network & Cybersecurity | Seqrite Blog
  • News
  • Security
  • Products
  • About Seqrite

Ransomware Archive

Beware! A new .Net Ransomware is encrypting files with .Lime

Beware! A new .Net Ransomware is encrypting files with .Lime

Estimated reading time: 4 minutes

Cases of the “Lime ransomware” have been recently reported to Quick Heal Security Labs. Our research team has analyzed these cases deeply and found some useful information. This post shares this information to help users stay safe from ransomware...
Read Blog
March 6, 2018
1
Share

Securing Your Endpoint in the Age of Ransomware Attacks

Securing Your Endpoint in the Age of Ransomware Attacks

Estimated reading time: 3 minutes

Last year we saw two high-profile ransomware attacks strike within a few weeks of each other, affecting more than a quarter million machines worldwide and causing major disruptions. With the adoption of the Eurocard/Mastercard/Visa payment standard increasing, credit card...
Read Blog
February 26, 2018

The Runner: a key component of the SamSam ransomware campaign – An analysis by Quick Heal Security Labs

The Runner: a key component of the SamSam ransomware campaign – An analysis by Quick Heal Security Labs

Estimated reading time: 4 minutes

In Jan 2018, Greenfield, Indiana-based Hancock Health (healthcare network) was attacked by SamSam ransomware. It encrypted the files containing patients’ data which disrupted their critical services. Even though SamSam is not a new ransomware, it has evolved over a...
Read Blog
February 8, 2018
4
Shares

Why you should never pay ransom to hackers

Why you should never pay ransom to hackers

Estimated reading time: 3 minutes

Since WannaCry swept the world in 2017, ransomware has become a network administrator’s worst nightmare. It’s not without any reason: the devastating WannaCry ransomware attack affected more than 200,000 computers across 150 countries with huge damages. Other notable ransomware attacks...
Read Blog
February 8, 2018
7
Shares

Android ransomware demands iTunes gift cards as a ransom – an analysis by Quick Heal Security Labs

Android ransomware demands iTunes gift cards as a ransom – an analysis by Quick Heal Security Labs

Estimated reading time: 4 minutes

Typically, a ransomware will demand money or cryptocurrency after it has locked down your computer or phone or encrypted its data. But, Quick Heal Security Labs has spotted an Android ransomware that demands iTunes gift cards after it locks...
Read Blog
December 12, 2017

New breeds of ransomware: Who’s at risk?

New breeds of ransomware: Who’s at risk?

Estimated reading time: 3 minutes

While ransomware threats keep bothering businesses regardless of their stature and size, organizations are slowly but steadily resorting to proactivity, to prevent infections and potential sabotages. The most frightening aspect of ransomware attacks is the evolution and sophistication on...
Read Blog
November 9, 2017

Another Ransomware Outbreak! This time it’s Bad Rabbit

Another Ransomware Outbreak! This time it’s Bad Rabbit

Estimated reading time: 3 minutes

The recent Bad Rabbit ransomware outbreak is currently making headlines. This post outlines the analysis of the ransomware by Quick Heal Security Labs. According to our telemetry, we have not seen any Bad Rabbit ransomware infection on our customer’s...
Read Blog
October 25, 2017

Protect your files or pay ransom: What will you choose?

Protect your files or pay ransom: What will you choose?

Estimated reading time: 3 minutes

Believe it or not, traditional cyber-criminals are slowly abandoning the obsolete techniques of making money-courtesy the growing popularity of ransomware attacks. The latter is a lucrative crime operation which plagues every business, regardless of its spread. Cyber extortionists keep...
Read Blog
October 24, 2017

How a ransomware infects your computer [INFOGRAPHIC]

How a ransomware infects your computer [INFOGRAPHIC]

Estimated reading time: < 1 minute

Education is a constant process – it never stops. While we have spoken about ransomware at great lengths in the past, there is no reason why we should not be doing that again. Ransomware is probably the most dreaded...
Read Blog
October 12, 2017

Analysis of recent Locky ransomware outbreak

Analysis of recent Locky ransomware outbreak

Estimated reading time: 2 minutes

Quick Heal Security Labs has been observing the infamous Locky ransomware outbreak which kicked off recently in the last week of September. The outbreak started with spam email with various subjects and different attachment names. On 26th September, spam campaign delivering a new...
Read Blog
September 30, 2017
260
Shares
1
← Previous 1 … 3 4 5 6 Next →
Featured Authors
  • Seqrite
    Seqrite

    Seqrite is a leading enterprise cybersecurity solutions provider. With a focus...

    Read more..
  • Jyoti Karlekar
    Jyoti Karlekar

    I'm an avid writer who enjoys crafting content about emerging technologies and...

    Read more..
  • Bineesh P
    Bineesh P

    I am a passionate cybersecurity enthusiast and a dedicated writer. With a knack...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director of Quick Heal Technologies...

    Read more..
Topics
apt (25) Cyber-attack (36) cyber-attacks (58) cyberattack (16) cyberattacks (15) Cybersecurity (334) cyber security (34) Cyber threat (33) cyber threats (50) data breach (56) data breaches (29) data loss (28) data loss prevention (33) data privacy (14) data protection (30) data security (15) DLP (49) DPDP (13) DPDPA (14) Encryption (16) endpoint security (110) Enterprise security (18) Exploit (13) GDPR (13) malware (76) malware analysis (13) malware attack (23) malware attacks (12) MDM (27) Microsoft (15) Network security (24) Patch Management (12) phishing (29) Ransomware (69) ransomware attack (30) ransomware attacks (30) ransomware protection (14) Seqrite (40) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) Threat Intelligence (13) UTM (34) Vulnerability (16) zero trust (13)
Loading
Blogs on Information Technology, Network & Cybersecurity | Seqrite

Leading enterprise IT security solutions provider simplifying endpoint, data, and network security with best-in-class threat prevention, detection, and response solutions worldwide.

Read More

Follow us:

Subscribe To Our Newsletter

Stay informed about the latest cybersecurity trends and insights.

Loading
Products & Services
  • Cloud
  • Endpoint Protection
  • Endpoint Detection and Response
  • Mobile Device Management
  • BYOD
  • Extended Detection and Response
  • Zero Trust Network Access
  • Data Privacy
  • On Prem
  • Endpoint Protection
  • Endpoint Detection and Response
  • Data Privacy
  • Platform
  • Malware Analysis Platform
  • Micro Business
  • SOHO Total Edition
  • Services
  • Threat Intel
  • Digital Risk Protection Services (DRPS)
  • Ransomware Recovery as a Services (RRaaS)
  • DPDP Compliance
  • Managed Detection and Response
Resources
  • Blogs
  • Whitepapers
  • Datasheets
  • Threat Reports
  • Manuals
  • Policy & Compliance
  • EULA
  • PoV
  • GoDeep.AI
Contact Us
  • Registered Offices
  • Nearest Offices
  • Let’s Talk Cybersecurity
Support
  • Technical Support
  • Download Software
  • Offline Updater
  • Firmware Upgrades
  • Upgrades
  • Product Documentation
About Us
  • About Seqrite
  • Leadership
  • Awards & Recognition
  • Newsroom
Partner
  • Partner Program
  • Locate Partner
  • Become A Partner
  • Seqrite Certification

© 2026 Quick Heal Technologies Ltd. Cookie Policies Privacy Policies