• News
  • Security
  • Products
  • About Seqrite
Blogs on Information Technology, Network & Cybersecurity | Seqrite Blog
  • News
  • Security
  • Products
  • About Seqrite

Monthly Archive:: March 2021

Zloader: Entailing Different Office Files

Zloader: Entailing Different Office Files

Estimated reading time: 4 minutes

Zloader aka Terdot – a variant of the infamous Zeus banking malware is well known for aggressively using “.xls”, “.xlsx” documents as its initial vector to deliver its payload. Despite this, recently we have come across “.docm” file which...
Read Blog
March 23, 2021

Defend your business systems from being used for illegal purposes

Defend your business systems from being used for illegal purposes

Estimated reading time: 2 minutes

For good reason, organizations regulate their employees’ access to their office devices. Of course, there are no overarching rules but organizations try to adopt a ‘horses for courses’ approach, i.e., an employee working in the financial sector who handles...
Read Blog
March 23, 2021

New Spear Phishing Campaign using Army Welfare Education Society’s Scholarship form

New Spear Phishing Campaign using Army Welfare Education Society’s Scholarship form

Estimated reading time: 4 minutes

Introduction: Researchers at Quick Heal Security Labs have uncovered a potential Spear Phishing campaign targeted against Indian Army personnel. In this attack, the attackers are using “Army Welfare Education Society” Scholarship form as lure. About AWES: Army Welfare Education...
Read Blog
March 22, 2021

Complying with data privacy laws will be a key priority in the new normal

Complying with data privacy laws will be a key priority in the new normal

Estimated reading time: 3 minutes

As a concept, privacy is seeing a paradigm shift in terms of its importance. Traditionally, for a developing country like India with its myriad of sociological and infrastructural issues, privacy came quite low on the priority list. However, with...
Read Blog
March 19, 2021

Nation-states shoot from somebody else’s shoulder

Nation-states shoot from somebody else’s shoulder

Estimated reading time: 3 minutes

The ever-changing nature of cyberthreats from Nation-States has recently come into sharp focus with the hacking of FireEye. Part of an overall larger cyberwarfare campaign against the United States government, the hacking is a reminder of an essential truism...
Read Blog
March 10, 2021
Featured Authors
  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director of Quick Heal Technologies...

    Read more..
  • Mahua Chakrabarthy
    Mahua Chakrabarthy

    A tea connoisseur who firmly believes that life is too short for dull content....

    Read more..
Topics
apt (19) Cyber-attack (35) cyber-attacks (58) cyberattack (16) cyberattacks (13) Cybersecurity (319) cyber security (30) Cyber threat (33) cyber threats (48) Data (11) data breach (55) data breaches (28) data loss (28) data loss prevention (34) data protection (24) data security (15) DLP (49) Encryption (16) endpoint security (106) Enterprise security (17) Exploit (14) firewall (11) GDPR (12) hackers (11) IoT (10) malware (76) malware attack (23) malware attacks (12) MDM (25) Microsoft (15) Network security (22) Patch Management (12) phishing (27) Ransomware (67) ransomware attack (30) ransomware attacks (30) ransomware protection (13) security (11) Seqrite (33) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (16) windows (11)
Loading
Resources
  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies
About Us
  • About Seqrite
  • Leadership
  • Awards & Certifications
  • Newsroom
Archives
  • By Date
  • By Category
Loading

© 2025 Quick Heal Technologies Ltd. Cookie Policies Privacy Policies