• News
  • Security
  • Products
  • About Seqrite
Blogs on Information Technology, Network & Cybersecurity | Seqrite Blog
  • News
  • Security
  • Products
  • About Seqrite

Security Archive

What is Emotet?

What is Emotet?

Estimated reading time: 4 minutes

Emotet malware was first identified in 2014 as Banking trojan. Emotet has evolved from banking trojan to threat distributor till now. It has hit many organizations very badly in 2018 with its functionalities like spamming and spreading. Further with...
Read Blog
May 21, 2019

CVE-2019-0708 – A Critical “Wormable” Remote Code Execution Vulnerability in Windows RDP

CVE-2019-0708 – A Critical “Wormable” Remote Code Execution Vulnerability in Windows RDP

Estimated reading time: 2 minutes

This is an important security advisory related to a recently patched Critical remote code execution vulnerability in Microsoft Windows Remote Desktop Service (RDP). The vulnerability is identified as “CVE-2019-0708 – Remote Desktop Services Remote Code Execution Vulnerability”. MSRC blog mentions...
Read Blog
May 17, 2019

Miners snatching open source tools to strengthen their malevolent power!

Miners snatching open source tools to strengthen their malevolent power!

Estimated reading time: 9 minutes

From the last one year, Quick Heal Security Labs has been observing a boost in the number of mining malware. One of the ways to earn cryptocurrencies is to mine them. Nowadays cryptocurrency miner malware have become hot attack...
Read Blog
April 26, 2019

How important is it to test your cybersecurity incident response plan?

How important is it to test your cybersecurity incident response plan?

Estimated reading time: 2 minutes

With the incidents of cybercrime rising at an enormous rate, especially targeted attacks on organizations, many companies now have a cybersecurity incident response plan in place. However, a major reason these organizations still fail to respond effectively to a...
Read Blog
April 25, 2019

JCry – A Ransomware written in Golang!

JCry – A Ransomware written in Golang!

Estimated reading time: 4 minutes

For several months, QH Labs has been observing an upswing in ransomware activity. We found a new ransomware which is written in Go lang. Malware authors are finding it easy to write ransomware in Go lang rather than traditional programming...
Read Blog
April 9, 2019
15
Shares

Employees working on their personal devices? How to secure them

Employees working on their personal devices? How to secure them

Estimated reading time: 3 minutes

Work on personal devices. Employees love them. A lot of small companies and MSMEs are increasingly embracing Bring Your Own Device (BYOD) policies. But IT security is still skeptic about it. There’s a clear clash of wills here and...
Read Blog
March 15, 2019
14
Shares

CyberSecurity First Responders: Who are they and why enterprises should hire them

CyberSecurity First Responders: Who are they and why enterprises should hire them

Estimated reading time: 3 minutes

In our day-to-day lives, emergencies or accidents can and do happen. It can be on the roads, in the air, on the tracks – anywhere. When an incident like this occurs, the first people on the scene are the...
Read Blog
March 8, 2019
9
Shares

GandCrab Riding Emotet’s Bus!

GandCrab Riding Emotet’s Bus!

Estimated reading time: 4 minutes

Emotet Known for constantly changing its payload and infection vectors like spam mail, Malicious Doc and even Malicious JS files. It compromised a very high number of websites on the internet. Emotet malware campaign has existed since 2014. It comes...
Read Blog
February 15, 2019
10
Shares

GandCrab Ransomware along with Monero Miner and Spammer

GandCrab Ransomware along with Monero Miner and Spammer

Estimated reading time: 5 minutes

Recently we saw a new campaign through spam mail attachment- zip file. It contains JavaScript file which delivers a bundle of GandCrab Ransomware, Monero miner and Spammer. This bundle of multiple malware variants is nothing new, it is common...
Read Blog
January 24, 2019

GandCrab says, “We will become back very soon! ;)”

GandCrab says, “We will become back very soon! ;)”

Estimated reading time: 5 minutes

GandCrab has been in the wild since last week of January 2018. Over the period it kept learning from its mistakes and GandCrab’s agile development grabbed the attention of many security researchers. From moving its servers to Namecoin powered Top Level...
Read Blog
December 18, 2018
19
Shares
← Previous 1 2 3 4 … 21 Next →
Featured Authors
  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director of Quick Heal Technologies...

    Read more..
  • Mahua Chakrabarthy
    Mahua Chakrabarthy

    A tea connoisseur who firmly believes that life is too short for dull content....

    Read more..
Topics
apt (19) Cyber-attack (35) cyber-attacks (58) cyberattack (16) cyberattacks (13) Cybersecurity (322) cyber security (31) Cyber threat (33) cyber threats (48) Data (11) data breach (55) data breaches (28) data loss (28) data loss prevention (34) data privacy (11) data protection (24) data security (15) DLP (49) Encryption (16) endpoint security (107) Enterprise security (17) Exploit (14) firewall (11) GDPR (12) hackers (11) malware (76) malware attack (23) malware attacks (12) MDM (25) Microsoft (15) Network security (22) Patch Management (12) phishing (27) Ransomware (67) ransomware attack (30) ransomware attacks (30) ransomware protection (13) security (11) Seqrite (33) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (16) windows (11)
Loading
Resources
  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies
About Us
  • About Seqrite
  • Leadership
  • Awards & Certifications
  • Newsroom
Archives
  • By Date
  • By Category
Loading

© 2025 Quick Heal Technologies Ltd. Cookie Policies Privacy Policies