• News
  • Security
  • Products
  • About Seqrite
Blogs on Information Technology, Network & Cybersecurity | Seqrite Blog
  • News
  • Security
  • Products
  • About Seqrite

Monthly Archive:: November 2018

Your business is hit by a breach. Now what should you do?

Your business is hit by a breach. Now what should you do?

Estimated reading time: 3 minutes

The worst has happened. Your database has been breached and the company is scrambling for cover. Every second seems to be a time bomb and your IT security team is working overtime, trying to assess the damage. Your CEO...
Read Blog
November 26, 2018
11
Shares

Cybersecurity Roundup 2018

Cybersecurity Roundup 2018

Estimated reading time: 3 minutes

In almost a blink of the eye, the year will be over. In cybersecurity terms though, 2018 could probably be defined as “business as usual”. Cyber threats only increased, there were news of even more daring attacks and cyber...
Read Blog
November 22, 2018
22
Shares

Beware of these 5 scams this holiday season!

Beware of these 5 scams this holiday season!

Estimated reading time: 3 minutes

It’s the season of the holidays. Of fun, celebration and festivity. With just one hitch: cyber threats. The unfortunate fact is that cybercriminals are not on a holiday. They are continuously searching for ways in which they can damage...
Read Blog
November 20, 2018
11
Shares

Everything you need to know about RBI’s Circular on Basic Security Framework for Primary UCBs

Everything you need to know about RBI’s Circular on Basic Security Framework for Primary UCBs

Estimated reading time: 4 minutes

The recent spate of cyber-attacks on banks in India has left everyone worried. For those who haven’t kept count, Pune-based Cosmos Bank recently saw a massive security breach where Rs 94 crore was siphoned off. In a similar incident,...
Read Blog
November 12, 2018
27
Shares

The truth about the Twitter cryptocurrency giveaway

The truth about the Twitter cryptocurrency giveaway

Estimated reading time: 3 minutes

Whether you like him or dislike him, one thing you can’t disagree with is that Elon Musk, the man behind Tesla and SpaceX, is a bonafide star. What he says makes news and his every utterance becomes a headline....
Read Blog
November 10, 2018
1
Share

Obfuscated Equation Editor Exploit (CVE-2017-11882) spreading Hawkeye Keylogger

Obfuscated Equation Editor Exploit (CVE-2017-11882) spreading Hawkeye Keylogger

Estimated reading time: 6 minutes

Cyber-attacks through phishing emails are increasing and generally, attackers use DOC embedded macros to infiltrate victim’s machine. Recently Quick Heal Security Labs came across a Phishing e-mail sample which uses Microsoft’s equation editor exploit to spread Hawkeye keylogger. Cybercriminals...
Read Blog
November 1, 2018
5
Shares
Featured Authors
  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director of Quick Heal Technologies...

    Read more..
  • Mahua Chakrabarthy
    Mahua Chakrabarthy

    A tea connoisseur who firmly believes that life is too short for dull content....

    Read more..
Topics
apt (19) Cyber-attack (35) cyber-attacks (58) cyberattack (16) cyberattacks (13) Cybersecurity (319) cyber security (30) Cyber threat (33) cyber threats (48) Data (11) data breach (55) data breaches (28) data loss (28) data loss prevention (34) data protection (24) data security (15) DLP (49) Encryption (16) endpoint security (106) Enterprise security (17) Exploit (14) firewall (11) GDPR (12) hackers (11) IoT (10) malware (76) malware attack (23) malware attacks (12) MDM (25) Microsoft (15) Network security (22) Patch Management (12) phishing (27) Ransomware (67) ransomware attack (30) ransomware attacks (30) ransomware protection (13) security (11) Seqrite (33) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (16) windows (11)
Loading
Resources
  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies
About Us
  • About Seqrite
  • Leadership
  • Awards & Certifications
  • Newsroom
Archives
  • By Date
  • By Category
Loading

© 2025 Quick Heal Technologies Ltd. Cookie Policies Privacy Policies