• News
  • Security
  • Products
  • About Seqrite
Blogs on Information Technology, Network & Cybersecurity | Seqrite Blog
  • News
  • Security
  • Products
  • About Seqrite

Ransomware Archive

Seqrite EPS accredited with “Advanced Approved Endpoint Protection” for protection against complex ransomware attacks

Seqrite EPS accredited with “Advanced Approved Endpoint Protection” for protection against complex ransomware attacks

Estimated reading time: 2 minutes

Enterprises are no longer safe from dangerous and expensive ransomware attacks in modern times. It can enter an organization through multiple vectors, such as email spam, phishing attacks, or malicious web downloads. For the highest level of protection, organizations...
Read More
January 3, 2022

Top 6 cybersecurity threats that every Startup or Business should have to be ready to fight in current times

Top 6 cybersecurity threats that every Startup or Business should have to be ready to fight in current times

Estimated reading time: 4 minutes

If you’ve been following the news recently, you’ll undoubtedly have read about cybersecurity incidents impacting corporations of all sizes in all industries around the world. While it doesn’t often make the news, even small- and medium-sized businesses (SMBs) have...
Read More
December 3, 2021

Anydesk Software Exploited to Spread Babuk Ransomware

Anydesk Software Exploited to Spread Babuk Ransomware

Estimated reading time: 8 minutes

We generally see that ransomware attacks are deployed through exploits, unsolicited malicious emails (malspam), or malicious Microsoft Office documents. Attackers trick the unsuspecting users into enabling macros, etc. Apart from these usual attack techniques, we came across a new...
Read More
November 24, 2021

REvil Returns: Diving Deeper Into the Kaseya VSA Ransomware Attack

REvil Returns: Diving Deeper Into the Kaseya VSA Ransomware Attack

Estimated reading time: 5 minutes

In a recent event, Kaseya – the US-based software provider for MSPs and IT Teams has reported a worldwide Supply Chain Attack on July 2, 2021 taking advantage of US Independence Day as a leverage since the strength of...
Read More
July 15, 2021

Turn the Page: Cybersecurity Predictions for 2021 & beyond

Turn the Page: Cybersecurity Predictions for 2021 & beyond

Estimated reading time: 2 minutes

Making accurate predictions, especially for cybersecurity needs years of experience — 2020 was a different situation altogether. Amidst many forecasts, no one predicted the onslaught of a global pandemic that would disrupt the world as we know it, baffling...
Read More
February 18, 2021

BEC and Ransomware attacks increase during the pandemic

BEC and Ransomware attacks increase during the pandemic

Estimated reading time: 2 minutes

The ongoing COVID-19 pandemic has had a far-reaching impact on the world as we know —it has also led to a huge increase in cyber frauds. Emboldened by the chaos and instability caused by the pandemic, threat actors have...
Read More
January 22, 2021

PonyFinal Ransomware dubbed by many as the modern-day Trojan horse.

PonyFinal Ransomware dubbed by many as the modern-day Trojan horse.

Estimated reading time: 2 minutes

Microsoft recently warned its over 100,000 followers about the emergence of a new human-operated Java-based ransomware that has been involved in targeted attacks in the US, India and Iran. PonyFinal, the name of this malware, is an example of...
Read More
August 26, 2020

Hackers steal e-commerce databases, demand Bitcoin as ransom.

Hackers steal e-commerce databases, demand Bitcoin as ransom.

Estimated reading time: 2 minutes

E-commerce platforms have always been a favourite target for hackers. The recent months have brought into attention a new campaign by malicious hackers to penetrate insecure servers of e-commerce platforms, steal their databases and then demand Bitcoin to return...
Read More
July 16, 2020

Snake Ransomware brings impending doom to enterprise networks

Snake Ransomware brings impending doom to enterprise networks

Estimated reading time: 5 minutes

New targeted ransomware called SNAKE or EKANS was found in early January. Malware is written in the Go language and it is heavily obfuscated and goes after ICS environments. Snake Ransomware seems to be distributed via a focused and...
Read More
July 10, 2020

Maze ransomware continues to induce maximum mayhem for the enterprise

Maze ransomware continues to induce maximum mayhem for the enterprise

Estimated reading time: 6 minutes

Maze is a recently highlighted ransomware among the ever-growing list of ransomware families. The ransomware is active from the past one year, although it came into limelight due to its new approach of publishing sensitive data of infected customers...
Read More
June 18, 2020
1 2 … 6 Next →
Popular Posts
  • 5 Security measures you should take to protect your organization’s network 5 Security measures you should take to protect your organization’s network August 11, 2017
  • Benefits of having Intrusion Prevention/Detection System in your enterprise Benefits of having Intrusion Prevention/Detection System in your enterprise February 15, 2018
  • Uncovering LockBit Black’s Attack Chain and Anti-forensic activity Uncovering LockBit Black’s Attack Chain and Anti-forensic activity February 1, 2023
Featured Authors
  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director and Chief Technology Officer of...

    Read more..
  • Jayesh Kulkarni
    Jayesh Kulkarni

    Jayesh is working as a Security Researcher for a couple of years. He likes to...

    Read more..
Stay Updated!
Topics
apt (11) Cyber-attack (32) cyber-attacks (56) cyberattack (11) cyberattacks (12) Cybersecurity (301) cyber security (26) Cyber threat (29) cyber threats (44) Data (11) data breach (50) data breaches (27) data loss (28) data loss prevention (33) data protection (21) data security (13) DLP (49) Encryption (16) endpoint security (103) Enterprise security (15) EPS (10) Exploit (12) firewall (11) hackers (11) IoT (10) malware (64) malware attack (23) malware attacks (12) MDM (25) Microsoft (14) Network security (18) Patch Management (12) phishing (18) Ransomware (60) ransomware attack (29) ransomware attacks (30) ransomware protection (12) security (10) Seqrite (26) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (15) windows (11)
Products
  • Seqrite MSSP Portal
  • HawkkScan
  • HawkkProtect
  • HawkkHunt XDR
  • HawkkEye
  • HawkkEye Endpoint Security Cloud
  • HawkkEye mSuite
  • HawkkEye Workspace
  • Endpoint Security (EPS)
  • Unified Threat Management
  • Antivirus for Server
  • Antivirus for Linux
Resources
  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies
About Us
  • Company Overview
  • Leadership
  • Why choose SEQRITE?
  • Awards & Certifications
  • Newsroom
Archives
  • By Date
  • By Category

© 2022 Quick Heal Technologies Ltd. Cookie Policies Privacy Policies

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website.
By browsing this website, you agree to our cookie policy.