• News
  • Security
  • Products
  • About Seqrite
Seqrite Blog Blog
  • News
  • Security
  • Products
  • About Seqrite

malware Archive

How to avoid dual attack and vulnerable files with double extension?

Estimated reading time: 2 minutes

The dual extension or double extension is one of the oldest forms of cyber-attacks but continues to be extremely effective. The reason for the continued effectiveness of this type of attack lies in its simplicity. File extensions are so...
Read More
April 9, 2021

Anyone, even you, can carry out cyberattacks with the Malware-as-a-Service model

Malware-as-a-service: Cybercrime’s nine-to-five

Estimated reading time: 2 minutes

In an age where solutions like cloud, mobility, storage and security are offered as part of service models, it is to no surprise that malware also has its service offering, aptly called Malware-as-a-Service (MaaS)? Of course, there’s a misnomer...
Read More
October 30, 2020

The return of the Emotet as the world unlocks!

Beware! Emotet Trojan is back

Estimated reading time: 5 minutes

A threat actor named Emotet Trojan has been in the wild for more than 5 years, and now it is back after a 5 months break. It has spread globally, infecting new as well as old targets. It is...
Read More
September 29, 2020

Operation SideCopy!

Operation SideCopy Hiding in plain sight!

Estimated reading time: 3 minutes

An insight into Transparent Tribe’s sub-division which has been incorrectly attributed for years. Introduction Quick Heal’s threat intelligence team recently uncovered evidence of an advanced persistent threat (APT) against Indian defence forces. Our analysis shows that many old campaigns...
Read More
September 23, 2020
4

Snake Ransomware brings impending doom to enterprise networks

Snake ransomware stings to spread its venom in the veins of enterprise networks.

Estimated reading time: 5 minutes

New targeted ransomware called SNAKE or EKANS was found in early January. Malware is written in the Go language and it is heavily obfuscated and goes after ICS environments. Snake Ransomware seems to be distributed via a focused and...
Read More
July 10, 2020

Defending businesses from the perils of Cryptojacking

A-Swarm-of-Cryptojacking

Estimated reading time: 2 minutes

The last few years have given rise to a new & dangerous cyberthreat known as cryptojacking which is unlike typical malware — it does not demand ransom, spy or cripple enterprise systems or cause loss of data. We introduced...
Read More
January 6, 2020

What are the different techniques of intruding networks?

Understanding-network-intrusion-vectors

Estimated reading time: 2 minutes

Network performance is the key indicator of an enterprise’s productivity and health in these connected times. It is the prerequisite of every business enterprise to maintain a smooth network workflow; however, that is easier said than done. Enterprise networks...
Read More
December 19, 2019

New and Improved Scan Engine

Seqrite-New-and-Improved-Scan-Engine

Estimated reading time: 2 minutes

Summary: We are happy to announce the availability of “best-in-class”, indigenously developed new and improved AV Scan Engine that implements advanced technology to provide maximum protection against evolving global threats and includes following improvements: Lightweight: Reduced disk footprint Reduced...
Read More
December 19, 2019

How can the CISO tackle the challenge of talent shortage?

How-do-CISOs-cope-up-with-their-biggest-plight

Estimated reading time: 3 minutes

Year-after-year, apart from malware, the cybersecurity industry continues to face the major threat of finding skilled professionals. It’s a crisis that has been validated by concerning numbers from different sources — a report in 2018 by the International Information...
Read More
December 11, 2019

Mitigating cyber threats through Better data protection

Can-better-data-protection-help-in-mitigating-cyber-risks

Estimated reading time: 2 minutes

In September 2019, a massive data breach impacted an estimated 20 million people in the South American country of Ecuador. The population of Ecuador itself is 17 million which meant almost the entire population was at risk due to...
Read More
December 9, 2019
1 2 … 6 Next →

Popular Posts

  • New Spear Phishing Campaign using Army Welfare Education Society’s Scholarship form New Spear Phishing Campaign using Army Welfare Education Society’s Scholarship form March 22, 2021
  • Benefits of having Intrusion Prevention/Detection System in your enterprise Benefits of having Intrusion Prevention/Detection System in your enterprise February 15, 2018
  • 5 Security measures you should take to protect your organization’s network 5 Security measures you should take to protect your organization’s network August 11, 2017

Featured Authors

  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Viraj Talikotkar
    Viraj Talikotkar

    Viraj is a Lead Technical Writer at Quick Heal Technologies. He is always on...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director and Chief Technology Officer of...

    Read more..

Latest Posts

  • How to avoid dual attack and vulnerable files with double extension?

    How to avoid dual attack and vulnerable files with double extension?

    April 9, 2021
  • Cryptocurrency Malware: Bitcoin Mining threats you need to know about

    Cryptocurrency Malware: Bitcoin Mining threats you need to know about

    April 4, 2021
  • Zloader: Entailing Different Office Files

    Zloader: Entailing Different Office Files

    March 23, 2021

Stay Updated!

Topics

Antivirus For Linux (10) apt (10) Bitcoin (9) BYOD (9) COVID-19 (10) Cyber-attack (31) cyber-attacks (56) cyberattacks (12) Cybersecurity (284) cyber security (26) Cyber threat (29) cyber threats (44) Data (11) data breach (50) data breaches (27) data loss (28) data loss prevention (33) data protection (21) data security (13) DLP (49) Encryption (16) endpoint security (103) Enterprise security (14) EPS (9) Exploit (12) firewall (11) GDPR (10) IoT (10) malware (59) malware attack (23) malware attacks (12) MDM (25) Network security (18) Patch Management (12) phishing (17) Ransomware (56) ransomware attack (29) ransomware attacks (30) ransomware protection (12) Seqrite (24) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (10)

Products

  • Endpoint Security (EPS)
  • Seqrite Encryption Manager
  • Seqrite Endpoint Security Cloud
  • Cloud Security
  • Seqrite mSuite
  • Seqrite Workspace
  • Unified Threat Management
  • Antivirus for Server
  • Antivirus for Linux

Resources

  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies

About Us

  • Company Overview
  • Leadership
  • Why choose SEQRITE?
  • Awards & Certifications
  • Newsroom

Archives

  • By Date
  • By Category

© 2020 Quick Heal Technologies Ltd. (Formerly Known as Quick Heal Technologies Pvt. Ltd.) Cookie Policies Privacy Policies

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website.
By browsing this website, you agree to our cookie policy.