• News
  • Security
  • Products
  • About Seqrite
Blogs on Information Technology, Network & Cybersecurity | Seqrite Blog
  • News
  • Security
  • Products
  • About Seqrite

Monthly Archive:: December 2023

Operation RusticWeb targets Indian Govt: From Rust-based malware to Web-service exfiltration

Operation RusticWeb targets Indian Govt: From Rust-based malware to Web-service exfiltration

Estimated reading time: 11 minutes

SEQRITE Labs APT-Team has uncovered a phishing campaign targeting various Indian government personnel since October 2023. We have also identified targeting of both government and private entities in the defence sector over December. New Rust-based payloads and encrypted PowerShell commands have been utilized...
Read Blog
December 21, 2023

Time to Secure the Future is Now: Use Cases for Choosing XDR Solution

Time to Secure the Future is Now: Use Cases for Choosing XDR Solution

Estimated reading time: 3 minutes

With an ever-growing attack surface in a hyper-connected digital world, there has never been a more critical time to secure the future. With access to tools like ChatGPT and more personalized spear-phishing attacks, hackers are always one step ahead,...
Read Blog
December 20, 2023

Decoding BATLOADER 2.X: Unmasking the Threat of Stealthy Malware Tactics

Decoding BATLOADER 2.X: Unmasking the Threat of Stealthy Malware Tactics

Estimated reading time: 5 minutes

Overview: Batloader is not a new malware in the series – it is an emerging one. In our previous blogs, we discussed how Batloader can deploy different types of malware, including stealers and ransomware. We also delved into its...
Read Blog
December 18, 2023

Cerber Ransomware Exposed: A Comprehensive Analysis of Advanced Tactics, Encryption, and Evasion

Cerber Ransomware Exposed: A Comprehensive Analysis of Advanced Tactics, Encryption, and Evasion

Estimated reading time: 6 minutes

Cerber is a strain of ransomware that was first identified in early 2016. It is a type of malware that encrypts a victim’s files and demands a ransom for the decryption key needed to unlock the files. Cerber, like...
Read Blog
December 13, 2023

Traversing the Cybersecurity Landscape: Unveiling the Essence of XDR

Traversing the Cybersecurity Landscape: Unveiling the Essence of XDR

Estimated reading time: 3 minutes

In the ever-evolving territory of cybersecurity, where businesses face persistent incidents of Advanced Attacks, the Extended Detection and Response (XDR) solution has become a crucial component in fortifying their IT infrastructure. This blog highlights the gist of the SEQRITE-ETCISO...
Read Blog
December 11, 2023
Featured Authors
  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director of Quick Heal Technologies...

    Read more..
  • Mahua Chakrabarthy
    Mahua Chakrabarthy

    A tea connoisseur who firmly believes that life is too short for dull content....

    Read more..
Topics
apt (19) Cyber-attack (35) cyber-attacks (58) cyberattack (16) cyberattacks (13) Cybersecurity (319) cyber security (30) Cyber threat (33) cyber threats (48) Data (11) data breach (55) data breaches (28) data loss (28) data loss prevention (34) data protection (24) data security (15) DLP (49) Encryption (16) endpoint security (106) Enterprise security (17) Exploit (14) firewall (11) GDPR (12) hackers (11) IoT (10) malware (76) malware attack (23) malware attacks (12) MDM (25) Microsoft (15) Network security (22) Patch Management (12) phishing (27) Ransomware (67) ransomware attack (30) ransomware attacks (30) ransomware protection (13) security (11) Seqrite (33) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (16) windows (11)
Loading
Resources
  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies
About Us
  • About Seqrite
  • Leadership
  • Awards & Certifications
  • Newsroom
Archives
  • By Date
  • By Category
Loading

© 2025 Quick Heal Technologies Ltd. Cookie Policies Privacy Policies