• News
  • Security
  • Products
  • About Seqrite
Blogs on Information Technology, Network & Cybersecurity | Seqrite Blog
  • News
  • Security
  • Products
  • About Seqrite

Malware Archive

Anyone, even you, can carry out cyberattacks with the Malware-as-a-Service model

Anyone, even you, can carry out cyberattacks with the Malware-as-a-Service model

Estimated reading time: 2 minutes

In an age where solutions like cloud, mobility, storage and security are offered as part of service models, it is to no surprise that malware also has its service offering, aptly called Malware-as-a-Service (MaaS)? Of course, there’s a misnomer...
Read Blog
October 30, 2020

MassLogger: An Emerging Spyware and Keylogger

MassLogger: An Emerging Spyware and Keylogger

Estimated reading time: 7 minutes

Summary: We have been dealing with a new spyware for the past two months, named MassLogger. This advanced keylogger and spyware are distributed via MalSpam attachments and has more features than other present keylogger tools. It has been observed...
Read Blog
July 31, 2020

Snake Ransomware brings impending doom to enterprise networks

Snake Ransomware brings impending doom to enterprise networks

Estimated reading time: 4 minutes

New targeted ransomware called SNAKE or EKANS was found in early January. Malware is written in the Go language and it is heavily obfuscated and goes after ICS environments. Snake Ransomware seems to be distributed via a focused and...
Read Blog
July 10, 2020

Operation ‘Honey Trap’: APT36 Targets Defence Organizations in India

Operation ‘Honey Trap’: APT36 Targets Defence Organizations in India

Estimated reading time: 3 minutes

Summary In the last 3 months, we have noticed increased activity from APT36, a Pakistan-linked Cyber Threat actor. The target this time are personnel belonging to defence organizations & other Government organizations in India. In the recent wave of...
Read Blog
July 8, 2020

Transparent Tribe Targeting Critical Indian Organizations

Transparent Tribe Targeting Critical Indian Organizations

Estimated reading time: 5 minutes

Quick Heal Labs have been tracking this Cyber-espionage operation since 2016. We have identified this attack as operation m_project. From the past year, we have seen a surge in these APT activities. Modus operandi of the attackers have remained...
Read Blog
May 12, 2020

Coronavirus-themed Campaign delivers Agent Tesla Malware

Coronavirus-themed Campaign delivers Agent Tesla Malware

Estimated reading time: 6 minutes

While the whole world fights against the COVID-19 pandemic, cybercriminals are busy exploiting the situation and attacking vulnerable users & businesses. In the last few weeks, there has been a rise in coronavirus-themed malspams, which are being used to...
Read Blog
May 12, 2020

Java RAT Campaign Targets Co-Operative Banks in India

Java RAT Campaign Targets Co-Operative Banks in India

Estimated reading time: 8 minutes

Summary While the entire world is busy fighting COVID-19 pandemic, cybercriminals have latched onto the opportunity and used the theme to propagate numerous cyber-attacks. The latest in line is a targeted attack against co-operative banks in India. In April...
Read Blog
May 12, 2020

Preventing malware from spreading with Seqrite Endpoint Security

Preventing malware from spreading with Seqrite Endpoint Security

Estimated reading time: 2 minutes

The spread of computer malware can be devastatingly fast — a cursory look at some of the top computer malware in the age of modern history shows the speed at which they replicate and the damage they cause. From...
Read Blog
November 25, 2019

Pegasus like spyware could be snooping on you right now!!

Pegasus like spyware could be snooping on you right now!!

Estimated reading time: 4 minutes

The recent news of Pegasus spyware attack via WhatsApp that targeted lawyers, journalists and human rights activists, offers an astonishing revelation on the kind of havoc such spyware can create. We covered the topic extensively, recently. The frequent media...
Read Blog
November 22, 2019

BlueKeep Attacks seen in the wild!

Estimated reading time: 2 minutes

CVE-2019-0708, popularly known as BlueKeep, is a RDP pre-authentication vulnerability which allows attacker to compromise a vulnerable system without user’s interaction. This exploit is also wormable, meaning that it can spread to other vulnerable systems in a similar way...
Read Blog
November 8, 2019
← Previous 1 2 3 4 … 9 Next →
Featured Authors
  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director of Quick Heal Technologies...

    Read more..
  • Mahua Chakrabarthy
    Mahua Chakrabarthy

    A tea connoisseur who firmly believes that life is too short for dull content....

    Read more..
Topics
apt (19) Cyber-attack (35) cyber-attacks (58) cyberattack (16) cyberattacks (13) Cybersecurity (319) cyber security (30) Cyber threat (33) cyber threats (48) Data (11) data breach (55) data breaches (28) data loss (28) data loss prevention (34) data protection (24) data security (15) DLP (49) Encryption (16) endpoint security (106) Enterprise security (17) Exploit (14) firewall (11) GDPR (12) hackers (11) IoT (10) malware (76) malware attack (23) malware attacks (12) MDM (25) Microsoft (15) Network security (22) Patch Management (12) phishing (27) Ransomware (67) ransomware attack (30) ransomware attacks (30) ransomware protection (13) security (11) Seqrite (33) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (16) windows (11)
Loading
Resources
  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies
About Us
  • About Seqrite
  • Leadership
  • Awards & Certifications
  • Newsroom
Archives
  • By Date
  • By Category
Loading

© 2025 Quick Heal Technologies Ltd. Cookie Policies Privacy Policies