• News
  • Security
  • Products
  • About Seqrite
Blogs on Information Technology, Network & Cybersecurity | Seqrite Blog
  • News
  • Security
  • Products
  • About Seqrite

Information Technology, Network Security & Cybersecurity Updates

Calling from the Underground: An alternative way to penetrate corporate networks

Calling from the Underground: An alternative way to penetrate corporate networks

Estimated reading time: 5 minutes

Threat actors use multiple methods to distribute malware to infect specific targets. Even though various phishing methods are actively used and evolving, an alternative approach to increase their success rate is to call the target corporate companies. Techniques like...
Read More
January 11, 2023

Your Data and Devices are safe with SEQRITE

Your Data and Devices are safe with SEQRITE

Estimated reading time: 2 minutes

On 19th November at 8:17 am, we became aware of a false positive detection on excel files and the same getting quarantined on some customer devices. We sincerely regret the inconvenience caused. We immediately took necessary actions investigating the matter,...
Read More
November 19, 2022

9 Best Practices to Avoid Ransomware Infection

9 Best Practices to Avoid Ransomware Infection Individuals and organizations must implement the best cybersecurity practices to avoid ransomware infection and data loss. In the past few years, ransomware has become a menace due to various platforms on the...
Read More
October 10, 2022

Securing Cybersecurity for Enterprises and SMBs

Securing Cybersecurity for Enterprises and SMBs

Estimated reading time: 2 minutes

SEQRITE HawkkEye and MSSP Portal: One-stop-shop for the complete cybersecurity needs of Enterprises & SMBs   A few years ago, enterprises or SMBs would have scoffed at the notion of having a cybersecurity strategy in place to recover their...
Read More
July 14, 2022

CVE-2022-26134: Actively Exploited Atlassian OGNL Injection Zero-Day Vulnerability

CVE-2022-26134: Actively Exploited Atlassian OGNL Injection Zero-Day Vulnerability

Estimated reading time: 4 minutes

On June 2, 2022, CVE-2022-26134 “Confluence,” a zero-day remote code execution vulnerability, was discovered in all versions of the Confluence Server and Data Center. The attack was detected to be of high severity (CVSS:9.0/10.0) according to a security advisory...
Read More
July 5, 2022

CVE-2022-30190: Zero-day vulnerability “Follina” in MSDT exploited in the wild

CVE-2022-30190: Zero-day vulnerability “Follina” in MSDT exploited in the wild

Estimated reading time: 5 minutes

On May 30, 2022, CVE-2022-30190 “FOLLINA,” a zero-day remote code execution vulnerability discovered in Microsoft Windows Support Diagnostic Tool (MSDT) with high severity (CVSS:9.3). This MSDT tool diagnoses issues with applications such as Microsoft Office documents. Initial attack vector...
Read More
June 10, 2022

Threat Advisory: CVE-2022-30190 ‘Follina’ – Severe Zero-day Vulnerability discovered in MSDT

Threat Advisory: CVE-2022-30190 ‘Follina’ – Severe Zero-day Vulnerability discovered in MSDT

Estimated reading time: 2 minutes

A Zero-day Remote Code Execution Vulnerability with high severity has been identified as CVE-2022-30190 “FOLLINA” in Microsoft Windows Support Diagnostic Tool (MSDT). MSDT is a tool present on Windows version 7 and above and is used for diagnosis of...
Read More
June 3, 2022

Update security certificate to install Seqrite product successfully

Update security certificate to install Seqrite product successfully

Estimated reading time: 2 minutes

  Issue Received the following installer setup file corruption error during installation of the Seqrite product Reason This error occurs due to missing security certificates in Windows OS. This error is encountered during installation of the Seqrite product. Solutions...
Read More
May 4, 2022

Explained: What is Web3.0 and Why Does it Matter?

Explained: What is Web3.0 and Why Does it Matter?

Estimated reading time: 3 minutes

The Internet, as we all know it, is approaching a crossroads. The issues it’s currently facing are associated with the centralized model of computing (top-down, data-driven, and not necessarily human-centric), during which a finite number of private entities control...
Read More
April 8, 2022

Spring4Shell: Zero-Day vulnerability CVE-2022-22965 in Spring Framework

Spring4Shell: Zero-Day vulnerability CVE-2022-22965 in Spring Framework

Estimated reading time: 2 minutes

A Zero-day Remote Code Execution Vulnerability with critical severity has been identified as CVE-2022-22965 aka Spring4Shell or SpringShell in Spring Framework versions 5.3.0 to 5.3.17, 5.2.0 to 5.2.19 & older. The Spring Framework is an open-source, popular, feature-rich application...
Read More
April 6, 2022
1 2 … 62 Next →
Popular Posts
  • Benefits of having Intrusion Prevention/Detection System in your enterprise Benefits of having Intrusion Prevention/Detection System in your enterprise February 15, 2018
  • Artificial Intelligence – its use and misuse Artificial Intelligence – its use and misuse February 4, 2019
  • 5 Security measures you should take to protect your organization’s network 5 Security measures you should take to protect your organization’s network August 11, 2017
Featured Authors
  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director and Chief Technology Officer of...

    Read more..
  • Jayesh Kulkarni
    Jayesh Kulkarni

    Jayesh is working as a Security Researcher for a couple of years. He likes to...

    Read more..
Stay Updated!
Topics
apt (11) Cyber-attack (32) cyber-attacks (56) cyberattack (11) cyberattacks (12) Cybersecurity (301) cyber security (26) Cyber threat (29) cyber threats (44) Data (11) data breach (50) data breaches (27) data loss (28) data loss prevention (33) data protection (21) data security (13) DLP (49) Encryption (16) endpoint security (103) Enterprise security (15) EPS (10) Exploit (12) firewall (11) hackers (11) IoT (10) malware (64) malware attack (23) malware attacks (12) MDM (25) Microsoft (14) Network security (18) Patch Management (12) phishing (18) Ransomware (60) ransomware attack (29) ransomware attacks (30) ransomware protection (12) security (10) Seqrite (26) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (15) windows (11)
Products
  • Seqrite MSSP Portal
  • HawkkScan
  • HawkkProtect
  • HawkkHunt XDR
  • HawkkEye
  • HawkkEye Endpoint Security Cloud
  • HawkkEye mSuite
  • HawkkEye Workspace
  • Endpoint Security (EPS)
  • Unified Threat Management
  • Antivirus for Server
  • Antivirus for Linux
Resources
  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies
About Us
  • Company Overview
  • Leadership
  • Why choose SEQRITE?
  • Awards & Certifications
  • Newsroom
Archives
  • By Date
  • By Category

© 2022 Quick Heal Technologies Ltd. Cookie Policies Privacy Policies

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website.
By browsing this website, you agree to our cookie policy.