• News
  • Security
  • Products
  • About Seqrite
Blogs on Information Technology, Network & Cybersecurity | Seqrite Blog
  • News
  • Security
  • Products
  • About Seqrite

Monthly Archive:: October 2017

A recent .NET Framework zero day Vulnerability (CVE-2017-8759) is dropping Infostealer malware- An analysis by Quick Heal Security Labs

A recent .NET Framework zero day Vulnerability (CVE-2017-8759) is dropping Infostealer malware- An analysis by Quick Heal Security Labs

Estimated reading time: 4 minutes

.NET Framework Remote Code Execution Vulnerability (CVE-2017-8759) is a code injection vulnerability in the SOAP WSDL parser of .net framework. This vulnerability was a zero-day when it was spotted in the wild. Quick Heal Security Labs had released advisory in the month of...
Read Blog
October 16, 2017

Hacking requires exceptional skills: How can IT security pros stay ahead of the hackers?

Hacking requires exceptional skills: How can IT security pros stay ahead of the hackers?

Estimated reading time: 3 minutes

While security professionals keep developing better software programs, hackers simultaneously devise strategies for combating the upgraded defense. Therefore, in order to analyze the importance of cybersecurity while staying one step ahead of these hackers, the security professionals need to...
Read Blog
October 16, 2017

How to defend your organization’s data on both sides of the perimeter?

How to defend your organization’s data on both sides of the perimeter?

Estimated reading time: 2 minutes

Defending the organizational perimeter from data breaches forms the crux of an existing security strategy. Neutralizing potential damages emanating out of cybersecurity threats is possible only if the data sets are secured across both sides of the perimeter. When...
Read Blog
October 13, 2017

CVE-2017-11826 – Microsoft Office Memory Corruption Vulnerability – Alert!

CVE-2017-11826 – Microsoft Office Memory Corruption Vulnerability – Alert!

Estimated reading time: < 1 minute

The recent zero-day vulnerability in Microsoft Office vulnerability CVE-2017-11826 enables attackers to perform a Remote Code Execution on targeted machines. According to a recently published blog post, this vulnerability is being exploited in the wild. Microsoft has released a security update on October 10, 2017,...
Read Blog
October 13, 2017

Are you an easy hacking target?

Are you an easy hacking target?

Estimated reading time: 3 minutes

Most SMEs and startups believe that cyber attackers wouldn’t be interested in them courtesy smaller frameworks and restricted financial reserves. However, based on a report released by the Verizon Data Breach Investigations, at least 61 percent of the hacked...
Read Blog
October 12, 2017

How a ransomware infects your computer [INFOGRAPHIC]

How a ransomware infects your computer [INFOGRAPHIC]

Estimated reading time: < 1 minute

Education is a constant process – it never stops. While we have spoken about ransomware at great lengths in the past, there is no reason why we should not be doing that again. Ransomware is probably the most dreaded...
Read Blog
October 12, 2017

Central Bank of Kenya mandates robust cybersecurity across banks in Kenya by 30th Nov, 2017

Central Bank of Kenya mandates robust cybersecurity across banks in Kenya by 30th Nov, 2017

Estimated reading time: 5 minutes

The Central Bank of Kenya (CBK) recently issued a guideline to all commercials banks across Kenya to fortify their cybersecurity and establish effective cybersecurity governance and risk management. The CBK acknowledged the growing risk of cyber threats and highlighted...
Read Blog
October 11, 2017

How fraudulent SSL certificates could be utilized to hack your website?

How fraudulent SSL certificates could be utilized to hack your website?

Estimated reading time: 3 minutes

When it comes to validating the identity of any public key infrastructure, digital certificates hold all the aces. A digital certificate is more of an electronic snippet that lends legitimacy to a web service or portal— associating the same...
Read Blog
October 11, 2017

Cybercriminals know the importance of your data. Do you?

Cybercriminals know the importance of your data. Do you?

Estimated reading time: 3 minutes

Educating oneself when it comes to cybersecurity is extremely important and should always be stressed upon. A better understanding of this subject increases the chances of staying safe from the existing threats. More often than not, the importance of...
Read Blog
October 10, 2017

A fileless malware uses a unique technique – an analysis by Quick Heal Security Labs

A fileless malware uses a unique technique – an analysis by Quick Heal Security Labs

Estimated reading time: 3 minutes

Spam email campaigns have increased with the use of multiple random techniques which improve the efficiency of payload distribution to spread malware to more number of users. These attacks have been randomly observed to have increased rapidly in numbers;...
Read Blog
October 10, 2017
← Previous 1 2 3 Next →
Featured Authors
  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director of Quick Heal Technologies...

    Read more..
  • Mahua Chakrabarthy
    Mahua Chakrabarthy

    A tea connoisseur who firmly believes that life is too short for dull content....

    Read more..
Topics
apt (19) Cyber-attack (35) cyber-attacks (58) cyberattack (16) cyberattacks (13) Cybersecurity (319) cyber security (30) Cyber threat (33) cyber threats (48) Data (11) data breach (55) data breaches (28) data loss (28) data loss prevention (34) data protection (24) data security (15) DLP (49) Encryption (16) endpoint security (106) Enterprise security (17) Exploit (14) firewall (11) GDPR (12) hackers (11) IoT (10) malware (76) malware attack (23) malware attacks (12) MDM (25) Microsoft (15) Network security (22) Patch Management (12) phishing (27) Ransomware (67) ransomware attack (30) ransomware attacks (30) ransomware protection (13) security (11) Seqrite (33) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (16) windows (11)
Loading
Resources
  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies
About Us
  • About Seqrite
  • Leadership
  • Awards & Certifications
  • Newsroom
Archives
  • By Date
  • By Category
Loading

© 2025 Quick Heal Technologies Ltd. Cookie Policies Privacy Policies