• News
  • Security
  • Products
  • About Seqrite
Blogs on Information Technology, Network & Cybersecurity | Seqrite Blog
  • News
  • Security
  • Products
  • About Seqrite

Monthly Archive:: September 2017

Analysis of recent Locky ransomware outbreak

Analysis of recent Locky ransomware outbreak

Estimated reading time: 2 minutes

Quick Heal Security Labs has been observing the infamous Locky ransomware outbreak which kicked off recently in the last week of September. The outbreak started with spam email with various subjects and different attachment names. On 26th September, spam campaign delivering a new...
Read Blog
September 30, 2017
260
Shares
1

Cybersecurity News Rundown September 2017

Cybersecurity News Rundown September 2017

Estimated reading time: 3 minutes

Welcome to our Cybersecurity News Rundown for the month of September 2017. Here, we will be sharing latest and trending news on events and technological updates from the world of cybersecurity that happened over the past month. Make sure...
Read Blog
September 30, 2017

Gateway protection: Next-Gen security solution

Gateway protection: Next-Gen security solution

Estimated reading time: 3 minutes

Cyberworld has become a jungle full of dangerous beasts. There are so many threats out there that it requires a large and dedicated set of professionals with state of the art equipment to protect the organization against all of...
Read Blog
September 29, 2017

Cyber Intelligence averted major Internet service disruption in India

Cyber Intelligence averted major Internet service disruption in India

Estimated reading time: 4 minutes

A breach at IRINN systems could have affected India’s over 6000 ISPs, Government and Private Organisations. We at Seqrite’s Cyber Intelligence Labs (https://seqrite.com) working closely with our Partner, seQtree InfoServices (https://seqtree.com/) recently tracked a broadcast advertisement on a Darknet...
Read Blog
September 29, 2017
7

Encryption: Improve information security by turning it into codes

Encryption: Improve information security by turning it into codes

Estimated reading time: 3 minutes

Today the economy is all about data. All  the business financial information, customer information, Intellectual property information, and all other information about the business is stored in digital format. All this information is data. In a pre-digital era, the data was in physical...
Read Blog
September 28, 2017

What are software and zero-day vulnerabilities?

What are software and zero-day vulnerabilities?

Estimated reading time: 3 minutes

Software developers ensure that there are no security gaps when they release a new version of their software, be it an application or an operating system or any other kind of software. However, it is impossible to design a...
Read Blog
September 27, 2017

5 Best practices to prevent ransomware and safeguard your data

5 Best practices to prevent ransomware and safeguard your data

Estimated reading time: 3 minutes

Malware, including ransomware, viruses, trojans are a grave threat to organizations. Out of these, ransomware is unique. Not only does it steal and corrupt data, but it also locks out the users from their own systems so that taking...
Read Blog
September 26, 2017

What makes the Government vulnerable to hackers?

What makes the Government vulnerable to hackers?

Estimated reading time: 3 minutes

In 2014, the office of personnel management of US government was breached and records of about 18 million people were hacked. In India, four government websites were hacked and Aadhaar data (India’s social security scheme), of 130 million people...
Read Blog
September 25, 2017

Cybersecurity and cyber intelligence for a machine determined future

Cybersecurity and cyber intelligence for a machine determined future

Estimated reading time: 3 minutes

With the world moving towards a machine determined future, somewhere deep within, it does bother many of us when we think about the power we intend to leave in the hands of machines. Honestly, some of us are worried...
Read Blog
September 25, 2017

Healthcare IoT: The lesser known dangers of cyber attacks

Healthcare IoT: The lesser known dangers of cyber attacks

Estimated reading time: 3 minutes

Medical devices under cyber threat certainly make for some scary headlines. It’s not even an exaggeration when we say that healthcare essentials are the upcoming security nightmares; with hackers on a constant lookout for gaining access to secured systems....
Read Blog
September 22, 2017
1 2 3 Next →
Featured Authors
  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director of Quick Heal Technologies...

    Read more..
  • Mahua Chakrabarthy
    Mahua Chakrabarthy

    A tea connoisseur who firmly believes that life is too short for dull content....

    Read more..
Topics
apt (19) Cyber-attack (35) cyber-attacks (58) cyberattack (16) cyberattacks (13) Cybersecurity (319) cyber security (30) Cyber threat (33) cyber threats (48) Data (11) data breach (55) data breaches (28) data loss (28) data loss prevention (34) data protection (24) data security (15) DLP (49) Encryption (16) endpoint security (106) Enterprise security (17) Exploit (14) firewall (11) GDPR (12) hackers (11) IoT (10) malware (76) malware attack (23) malware attacks (12) MDM (25) Microsoft (15) Network security (22) Patch Management (12) phishing (27) Ransomware (67) ransomware attack (30) ransomware attacks (30) ransomware protection (13) security (11) Seqrite (33) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (16) windows (11)
Loading
Resources
  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies
About Us
  • About Seqrite
  • Leadership
  • Awards & Certifications
  • Newsroom
Archives
  • By Date
  • By Category
Loading

© 2025 Quick Heal Technologies Ltd. Cookie Policies Privacy Policies