• News
  • Security
  • Products
  • About Seqrite
Blogs on Information Technology, Network & Cybersecurity | Seqrite Blog
  • News
  • Security
  • Products
  • About Seqrite

Security Archive

An analysis of the Dharma ransomware outbreak by Quick Heal Security Labs

An analysis of the Dharma ransomware outbreak by Quick Heal Security Labs

Estimated reading time: 6 minutes

On April 25, 2018, Quick Heal Security Labs issued an advisory on a new ransomware outbreak. We are observing a sudden spike of Dharma Ransomware. Even though Dharma ransomware is old, we observed its new variant which is encrypting...
Read Blog
May 2, 2018

How important are security patches and updates

How important are security patches and updates

Estimated reading time: 3 minutes

Security vulnerabilities are increasing and just not so long before, we had to deal with so many of them. Remember WannaCry? In this post, we will discuss some important case in points with respect to security vulnerabilities and how...
Read Blog
April 23, 2018
5
Shares

Antivirus for Server: A comprehensive solution for complex networks

Antivirus for Server: A comprehensive solution for complex networks

Estimated reading time: 3 minutes

When it comes to large corporate networks with complex servers, one of the biggest headaches for network administrators is how to properly secure it from cybersecurity threats. In that respect, Seqrite’s Antivirus for Server offers a convenient, powerful solution: it...
Read Blog
April 2, 2018
19
Shares

An in-depth analysis of a new, emerging “.url” malware campaign

An in-depth analysis of a new, emerging “.url” malware campaign

Estimated reading time: 5 minutes

Last week, we had blogged about the emergence of a new attack vector ‘.url’ which is used to spread malware. In this blog post, we will deep-dive into the attack chain of this ‘.url’ vector and elaborate on the...
Read Blog
March 19, 2018
5
Shares

Chinese, Russian hackers counting on Apache Struts vulnerabilities – a report by Quick Heal Security Labs

Chinese, Russian hackers counting on Apache Struts vulnerabilities – a report by Quick Heal Security Labs

Estimated reading time: 4 minutes

Apache Struts is an open-source CMS based on MVC framework for developing Java EE Web Applications. Apache Struts has been widely used by many Fortune 100 companies and government agencies over the years for developing web applications. But, websites built using a CMS constantly need to...
Read Blog
March 7, 2018
13
Shares

How Cyber War Games can help you improve Incident Response Plan?

How Cyber War Games can help you improve Incident Response Plan?

Estimated reading time: 3 minutes

Ask any experienced network security expert and they will agree on the importance of having a strong, secure Incident Response Plan to safeguard an organization. After all, no security system is 100% foolproof and there is no guarantee that...
Read Blog
March 6, 2018
4
Shares

The Runner: a key component of the SamSam ransomware campaign – An analysis by Quick Heal Security Labs

The Runner: a key component of the SamSam ransomware campaign – An analysis by Quick Heal Security Labs

Estimated reading time: 4 minutes

In Jan 2018, Greenfield, Indiana-based Hancock Health (healthcare network) was attacked by SamSam ransomware. It encrypted the files containing patients’ data which disrupted their critical services. Even though SamSam is not a new ransomware, it has evolved over a...
Read Blog
February 8, 2018
4
Shares

Malspam campaigns exploiting recent MS Office vulnerability ‘CVE-2017-11882’

Malspam campaigns exploiting recent MS Office vulnerability ‘CVE-2017-11882’

Estimated reading time: 4 minutes

No wonder malspam campaigns are a major medium to spread malware. Previously, we have written about such campaigns making use of MS Office malware such as malicious macro, CVE-2017-0199, CVE-2017-8759 and DDE-based attack. Recently, we have started observing various malspam campaigns...
Read Blog
February 5, 2018
1

CVE-2018-4878 – Adobe Flash Player use after free (Zero Day) vulnerability Alert!

CVE-2018-4878 – Adobe Flash Player use after free (Zero Day) vulnerability Alert!

Estimated reading time: < 1 minute

The recent zero-day vulnerability CVE-2018-4878 in Adobe Flash Player enables attackers to perform a Remote Code Execution on targeted machines. Adobe has released a security advisory APSA18-01 on February 2, 2018 to address this issue. According to Adobe, the...
Read Blog
February 3, 2018

Machine learning approach for advanced threat hunting

Machine learning approach for advanced threat hunting

Estimated reading time: 6 minutes

In today’s fast-changing world, the cyber threat landscape is getting increasingly complex and signature-based systems are falling behind to protect endpoints. All major security solutions are built with layered security models to protect endpoints from today’s advanced threats. Machine...
Read Blog
February 2, 2018
5
Shares
← Previous 1 … 5 6 7 … 21 Next →
Featured Authors
  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director of Quick Heal Technologies...

    Read more..
  • Mahua Chakrabarthy
    Mahua Chakrabarthy

    A tea connoisseur who firmly believes that life is too short for dull content....

    Read more..
Topics
apt (19) Cyber-attack (35) cyber-attacks (58) cyberattack (16) cyberattacks (13) Cybersecurity (322) cyber security (31) Cyber threat (33) cyber threats (48) Data (11) data breach (55) data breaches (28) data loss (28) data loss prevention (34) data privacy (11) data protection (24) data security (15) DLP (49) Encryption (16) endpoint security (107) Enterprise security (17) Exploit (14) firewall (11) GDPR (12) hackers (11) malware (76) malware attack (23) malware attacks (12) MDM (25) Microsoft (15) Network security (22) Patch Management (12) phishing (27) Ransomware (67) ransomware attack (30) ransomware attacks (30) ransomware protection (13) security (11) Seqrite (33) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (16) windows (11)
Loading
Resources
  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies
About Us
  • About Seqrite
  • Leadership
  • Awards & Certifications
  • Newsroom
Archives
  • By Date
  • By Category
Loading

© 2025 Quick Heal Technologies Ltd. Cookie Policies Privacy Policies