• News
  • Security
  • Products
  • About Seqrite
Blogs on Information Technology, Network & Cybersecurity | Seqrite Blog
  • News
  • Security
  • Products
  • About Seqrite

Monthly Archive:: July 2024

What Can Be The Estimate Losses Caused By The Recent IT Outage Caused By Faulty CrowdStrike Update?

What Can Be The Estimate Losses Caused By The Recent IT Outage Caused By Faulty CrowdStrike Update?

Estimated reading time: 3 minutes

Cyberattacks using computer viruses or malware have been costing billions of dollars each year in cleanup and repair costs. Having been in this industry for almost three decades, I still recall some of the most notable and devastating computer...
Read Blog
July 30, 2024

Umbrella of Pakistani Threats: Converging Tactics of Cyber-operations Targeting India

Umbrella of Pakistani Threats: Converging Tactics of Cyber-operations Targeting India

Estimated reading time: 16 minutes

An open directory hosting malware linked to Transparent Tribe (APT36) has been found by SEQRITE Labs APT team. Further analysis revealed hidden URLs on the same domain containing payloads used by its sub-division APT group SideCopy. Targeting of Indian...
Read Blog
July 25, 2024

How to Avoid Falling for Fake Emails like “You Have Been Under Surveillance”

How to Avoid Falling for Fake Emails like “You Have Been Under Surveillance”

Estimated reading time: 3 minutes

How to Avoid Falling for Fake Emails like “You Have Been Under Surveillance” A recent email scam titled “You Have Been Under Surveillance” is a classic example of a sextortion scam. These scams involve cybercriminals threatening to expose sensitive...
Read Blog
July 4, 2024
Featured Authors
  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director of Quick Heal Technologies...

    Read more..
  • Mahua Chakrabarthy
    Mahua Chakrabarthy

    A tea connoisseur who firmly believes that life is too short for dull content....

    Read more..
Topics
apt (20) Cyber-attack (36) cyber-attacks (58) cyberattack (16) cyberattacks (13) Cybersecurity (324) cyber security (32) Cyber threat (33) cyber threats (48) Data (11) data breach (55) data breaches (28) data loss (28) data loss prevention (34) data privacy (12) data protection (25) data security (15) DLP (49) Encryption (16) endpoint security (108) Enterprise security (17) Exploit (14) firewall (11) GDPR (12) hackers (11) malware (76) malware attack (23) malware attacks (12) MDM (25) Microsoft (15) Network security (22) Patch Management (12) phishing (27) Ransomware (67) ransomware attack (30) ransomware attacks (30) ransomware protection (14) security (11) Seqrite (33) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (16) windows (11)
Loading
Resources
  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies
About Us
  • About Seqrite
  • Leadership
  • Awards & Certifications
  • Newsroom
Archives
  • By Date
  • By Category
Loading

© 2025 Quick Heal Technologies Ltd. Cookie Policies Privacy Policies