• News
  • Security
  • Products
  • About Seqrite
Blogs on Information Technology, Network & Cybersecurity | Seqrite Blog
  • News
  • Security
  • Products
  • About Seqrite

Monthly Archive:: June 2023

CVE-2023-34362: Critical ZERO-DAY Vulnerability in MOVEit Transfer

CVE-2023-34362: Critical ZERO-DAY Vulnerability in MOVEit Transfer

Estimated reading time: 5 minutes

The discovery of a zero-day vulnerability in MOVEit Transfer has brought attention to the potential risks of unauthorized access and the exploitation of elevated privileges within the system. MOVEit Transfer is widely recognized as a secure and popular managed...
Read Blog
June 22, 2023

Delving Further: Analyzing Another XSS Vulnerability Found in the Bookly Plugin

Delving Further: Analyzing Another XSS Vulnerability Found in the Bookly Plugin

Estimated reading time: 3 minutes

Our previous blog explored an XSS vulnerability within the Bookly plugin (WordPress Online Booking and Scheduling Plugin – Bookly). Today, we will delve into another XSS vulnerability that came to light during our research on the same plugin. Our...
Read Blog
June 19, 2023

Double Action, Triple Infection, and a New RAT: SideCopy’s Persistent Targeting of Indian Defence

Double Action, Triple Infection, and a New RAT: SideCopy’s Persistent Targeting of Indian Defence

Estimated reading time: 3 minutes

Overview A new attack campaign of SideCopy APT has been discovered targeting the Indian Defence sector. The group utilizes phishing email attachments & URLs as the infection vector to download malicious archive files leading to the deployment of two...
Read Blog
June 15, 2023

Supercharge your security operations with end-to-end visibility, protection, and response using SEQRITE XDR

Supercharge your security operations with end-to-end visibility, protection, and response using SEQRITE XDR

Estimated reading time: 3 minutes

In today’s ever-evolving threat landscape, an organization’s security operations have never been more crucial. The complexity of remote work and multiple devices, apps, and tools has expanded the attack surface. Cybercriminals use advanced tactics, including AI-powered spear-phishing attacks on...
Read Blog
June 8, 2023
Featured Authors
  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director of Quick Heal Technologies...

    Read more..
  • Mahua Chakrabarthy
    Mahua Chakrabarthy

    A tea connoisseur who firmly believes that life is too short for dull content....

    Read more..
Topics
apt (19) Cyber-attack (35) cyber-attacks (58) cyberattack (16) cyberattacks (13) Cybersecurity (319) cyber security (30) Cyber threat (33) cyber threats (48) Data (11) data breach (55) data breaches (28) data loss (28) data loss prevention (34) data protection (24) data security (15) DLP (49) Encryption (16) endpoint security (106) Enterprise security (17) Exploit (14) firewall (11) GDPR (12) hackers (11) IoT (10) malware (76) malware attack (23) malware attacks (12) MDM (25) Microsoft (15) Network security (22) Patch Management (12) phishing (27) Ransomware (67) ransomware attack (30) ransomware attacks (30) ransomware protection (13) security (11) Seqrite (33) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (16) windows (11)
Loading
Resources
  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies
About Us
  • About Seqrite
  • Leadership
  • Awards & Certifications
  • Newsroom
Archives
  • By Date
  • By Category
Loading

© 2025 Quick Heal Technologies Ltd. Cookie Policies Privacy Policies