• News
  • Security
  • Products
  • About Seqrite
Blogs on Information Technology, Network & Cybersecurity | Seqrite Blog
  • News
  • Security
  • Products
  • About Seqrite

Ransomware Archive

5 Best practices to prevent ransomware and safeguard your data

5 Best practices to prevent ransomware and safeguard your data

Estimated reading time: 3 minutes

Malware, including ransomware, viruses, trojans are a grave threat to organizations. Out of these, ransomware is unique. Not only does it steal and corrupt data, but it also locks out the users from their own systems so that taking...
Read Blog
September 26, 2017

New Hacking Threats: Biometric Vulnerabilities

New Hacking Threats: Biometric Vulnerabilities

Estimated reading time: 3 minutes

Biometric authentication seems to be the authentication technology of the future. Scan the finger on the finger print scanner and payment is done for your purchase. No need to type out your card details and enter OTPs. Scan your...
Read Blog
September 11, 2017

How Ransomware works: Understanding the strategy behind cyberattacks

How Ransomware works: Understanding the strategy behind cyberattacks

Estimated reading time: 4 minutes

Security concerns have skyrocketed in recent times, thanks to the spurt in cyberattacks, and especially ransomware. Ransomware tactics have been known for a long time now, but it is only in recent times that it has taken on very...
Read Blog
August 17, 2017

An analysis of GlobeImposter Ransomware by Quick Heal Security Labs

An analysis of GlobeImposter Ransomware by Quick Heal Security Labs

Estimated reading time: 5 minutes

GlobeImposter Ransomware has been increasingly active and observed recently to be appending different suffixes to files it encrypt. A few patterns observed are using 3 random numbers such as “.492, .490, .725, .726, and .707”, random alphanumeric words such...
Read Blog
August 11, 2017

Why choose Seqrite EPS against Ransomware?

Why choose Seqrite EPS against Ransomware?

Estimated reading time: 3 minutes

Ransomware, by now, has become as common a term, in the cyber security eco-system. With multiple massive ransomware attacks across the globe in recent times, almost everyone, including individual customers and organizations, have become aware of the threat that...
Read Blog
August 8, 2017

Malware alert! Beware of the BTCWare Aleta Ransomware

Malware alert! Beware of the BTCWare Aleta Ransomware

Estimated reading time: 3 minutes

Quick Heal Security Labs has observed the entry of a new BTCWare ransomware (first observed at the beginning of 2017) variant called ‘Aleta’. This ransomware is called so because it appends a “.aleta” extension to files it encrypts in...
Read Blog
July 25, 2017

Rise of Ransomware: How Seqrite can help your business stay protected

Rise of Ransomware: How Seqrite can help your business stay protected

Estimated reading time: 3 minutes

A ransomware attack can paralyze the functioning of an enterprise if they are unprepared. Over the years ransomware has become the most malicious attack faced by enterprises. In this attack, hackers hold your data hostage and demand a ransom...
Read Blog
July 4, 2017

Impact of WannaCry and Petya ransomware attack

Impact of WannaCry and Petya ransomware attack

Estimated reading time: 3 minutes

What’s the latest threat that keeps security administrators awake at night these days? Chances are, that the most definitive answer would be either “WannaCry” or “Petya”, or both. But why are these two breeds of malware so fearsome?  What’s...
Read Blog
July 3, 2017
1

A technical analysis of the recent Petya ransomware attack

A technical analysis of the recent Petya ransomware attack

Estimated reading time: 4 minutes

Earlier this week, a new variant of Petya Ransomware was spotted which was creating havoc all over Europe as well as major parts of Asia including India. The major target for Petya has been Ukraine as its major banks...
Read Blog
June 30, 2017

DOs and DON’Ts to stay safe from Ransomware (infographic)

DOs and DON’Ts to stay safe from Ransomware (infographic)

Estimated reading time: < 1 minute

Unless you live in a cave, you would definitely know what is a ransomware. It is a malware that is keeping Internet users awake at nights and restless during the day. It does not strike with a warning, and...
Read Blog
June 28, 2017
← Previous 1 … 4 5 6 7 Next →
Featured Authors
  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director of Quick Heal Technologies...

    Read more..
  • Mahua Chakrabarthy
    Mahua Chakrabarthy

    A tea connoisseur who firmly believes that life is too short for dull content....

    Read more..
Topics
apt (22) BYOD (11) Cyber-attack (36) cyber-attacks (58) cyberattack (16) cyberattacks (13) Cybersecurity (327) cyber security (34) Cyber threat (33) cyber threats (48) data breach (55) data breaches (28) data loss (28) data loss prevention (34) data privacy (13) data protection (28) data security (15) DLP (49) Encryption (16) endpoint security (109) Enterprise security (17) Exploit (14) firewall (11) GDPR (12) hackers (11) malware (76) malware attack (23) malware attacks (12) MDM (26) Microsoft (15) Network security (23) Patch Management (12) phishing (27) Ransomware (67) ransomware attack (30) ransomware attacks (30) ransomware protection (14) security (12) Seqrite (35) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (17) windows (11)
Loading
Resources
  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies
About Us
  • About Seqrite
  • Leadership
  • Awards & Certifications
  • Newsroom
Archives
  • By Date
  • By Category
Loading

© 2025 Quick Heal Technologies Ltd. Cookie Policies Privacy Policies