• News
  • Security
  • Products
  • About Seqrite
Blogs on Information Technology, Network & Cybersecurity | Seqrite Blog
  • News
  • Security
  • Products
  • About Seqrite

Information Technology, Network Security & Cybersecurity Updates

What are intra-state cyber threats and how to handle them?

What are intra-state cyber threats and how to handle them?

Estimated reading time: 3 minutes

In the new information age we live in, cyber threats represent an ever-growing and dangerous form of intimidation and pressure. These threats represent a new tool of warfare and seek to reap chaos and distrust. While much attention is...
Read Blog
January 28, 2019
8K
Shares

GandCrab Ransomware along with Monero Miner and Spammer

GandCrab Ransomware along with Monero Miner and Spammer

Estimated reading time: 5 minutes

Recently we saw a new campaign through spam mail attachment- zip file. It contains JavaScript file which delivers a bundle of GandCrab Ransomware, Monero miner and Spammer. This bundle of multiple malware variants is nothing new, it is common...
Read Blog
January 24, 2019

What kind of cyber threats loom over elections?

What kind of cyber threats loom over elections?

Estimated reading time: 3 minutes

Election hacking is among the most controversial and hotly-debated topics of today. For good reason too, free and fair elections are one of the major elements that make up a democratic society. It’s one of the tools for a...
Read Blog
January 21, 2019
8.1K
Shares

How to reduce the risk of data leakage when an employee is Out Of Office

How to reduce the risk of data leakage when an employee is Out Of Office

Estimated reading time: 3 minutes

Vacations are great. Employees like to get away from it all, the pressures of work, the many meetings, the deadlines, etc. But there’s another category of people who also love vacations and employees who are Out of Office (OOO)...
Read Blog
January 18, 2019
19
Shares

Applying Deep Learning for PE-Malware Classification

Applying Deep Learning for PE-Malware Classification

Estimated reading time: 6 minutes

Deep Learning & Computer vision techniques are making progress in every possible field. With growing computing powers many organizations use them to resolve or minimize many day-to-day problems. In a recent talk at AVAR 2018, Quick Heal AI team...
Read Blog
January 10, 2019
15
Shares

Beware! Your website might be delivering Emotet malware

Beware! Your website might be delivering Emotet malware

Estimated reading time: 10 minutes

In 2018, we saw a surge in Emotet activity. Emotet started as a banking trojan but this blog will shed light on how it has also become a “threat distributor”. We will also discuss server-side and client-side activity and...
Read Blog
December 29, 2018
15
Shares

Data Security Compliance for NBFCs

Data Security Compliance for NBFCs

Estimated reading time: 3 minutes

Non-bank financial institutions (NBFIs) or non-bank financial companies (NBFCs) have been an integral part of the Indian financial system. These are financial institutions that do not have a banking license or regulated by an agency but can still carry...
Read Blog
December 20, 2018
19
Shares

GandCrab says, “We will become back very soon! ;)”

GandCrab says, “We will become back very soon! ;)”

Estimated reading time: 5 minutes

GandCrab has been in the wild since last week of January 2018. Over the period it kept learning from its mistakes and GandCrab’s agile development grabbed the attention of many security researchers. From moving its servers to Namecoin powered Top Level...
Read Blog
December 18, 2018
19
Shares

Ghost Has Arrived

Ghost Has Arrived

Estimated reading time: 5 minutes

On the back of an upswing in Ransomware activity, we decided to carry out an in-depth analysis of Ghost Ransomware. Interesting fact about this malware is that it uses multiple components to encrypt user files. Technical Analysis : Main...
Read Blog
December 14, 2018
26
Shares

Sophisticated Ransomware : “Katyusha”

Sophisticated Ransomware : “Katyusha”

Estimated reading time: 6 minutes

For several months, Quick Heal Security Labs has been observing an increase in ransomware, we have found one more interesting ransomware which encrypts files and adds extension “.katyusha” and demands for an amount of 0.5 btc within three days and threatens to...
Read Blog
December 14, 2018
17
Shares
← Previous 1 … 33 34 35 … 72 Next →
Featured Authors
  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director of Quick Heal Technologies...

    Read more..
  • Mahua Chakrabarthy
    Mahua Chakrabarthy

    A tea connoisseur who firmly believes that life is too short for dull content....

    Read more..
Topics
apt (19) Cyber-attack (35) cyber-attacks (58) cyberattack (16) cyberattacks (13) Cybersecurity (319) cyber security (30) Cyber threat (33) cyber threats (48) Data (11) data breach (55) data breaches (28) data loss (28) data loss prevention (34) data protection (24) data security (15) DLP (49) Encryption (16) endpoint security (106) Enterprise security (17) Exploit (14) firewall (11) GDPR (12) hackers (11) IoT (10) malware (76) malware attack (23) malware attacks (12) MDM (25) Microsoft (15) Network security (22) Patch Management (12) phishing (27) Ransomware (67) ransomware attack (30) ransomware attacks (30) ransomware protection (13) security (11) Seqrite (33) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (16) windows (11)
Loading
Resources
  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies
About Us
  • About Seqrite
  • Leadership
  • Awards & Certifications
  • Newsroom
Archives
  • By Date
  • By Category
Loading

© 2025 Quick Heal Technologies Ltd. Cookie Policies Privacy Policies