• News
  • Security
  • Products
  • About Seqrite
Blogs on Information Technology, Network & Cybersecurity | Seqrite Blog
  • News
  • Security
  • Products
  • About Seqrite

Monthly Archive:: August 2024

Operation Oxidový: Sophisticated Malware Campaign Targets Czech Officials Using NATO-Themed Decoys

Operation Oxidový: Sophisticated Malware Campaign Targets Czech Officials Using NATO-Themed Decoys

Estimated reading time: 9 minutes

Seqrite Labs APT-Team has recently found a campaign targeting the Czech Republic. The campaign targets government and military officials with multiple lures aimed at the relationship between NATO and the Czech Republic. The entire malware ecosystem is involved in...
Read Blog
August 28, 2024

ZTNA Explained: What It Is, Why It Matters, and How to Get Started

ZTNA Explained: What It Is, Why It Matters, and How to Get Started

Estimated reading time: 4 minutes

In June 2024, a severe data breach shook South Korea’s armed forces. An insider accessed and leaked highly confidential personal information of the country’s undercover agents, jeopardizing their lives. Incidents like this have become common in today’s rapidly evolving...
Read Blog
August 26, 2024

Beyond the Basics: EDR vs. Antivirus and What You Need to Know

Beyond the Basics: EDR vs. Antivirus and What You Need to Know

Estimated reading time: 6 minutes

Beyond the Basics: EDR vs. Antivirus and What You Need to Know In this hyperconnected digital world, organizations face increasingly sophisticated cyber threats that demand advanced protection measures. The rise of endpoint detection and response (EDR) solutions has revolutionized...
Read Blog
August 26, 2024

Unlock Security: The Power of Network Segmentation

Unlock Security: The Power of Network Segmentation

Estimated reading time: 6 minutes

In the wake of numerous security incidents in which attackers exploited unsegmented networks to spread malware and access sensitive data, it’s clear that traditional network architectures often fail to prevent the lateral movement of threats. This blog will illustrate...
Read Blog
August 23, 2024

The Many Benefits and Use Cases of Having an EDR Solution

The Many Benefits and Use Cases of Having an EDR Solution

Estimated reading time: 3 minutes

The Many Benefits and Use Cases of Having an EDR Solution In today’s rapidly evolving threat landscape, Endpoint Detection and Response (EDR) solution has become an indispensable tool for modern businesses. EDR is a cutting-edge technology that monitors end-user...
Read Blog
August 20, 2024

Unmasking Cronus: How Fake PayPal Documents Deliver Fileless Ransomware via PowerShell

Unmasking Cronus: How Fake PayPal Documents Deliver Fileless Ransomware via PowerShell

Estimated reading time: 8 minutes

Seqrite Labs APT-Team has recently discovered multiple campaigns involving fake PayPal lures. These are targeting individuals around the globe with a new variant of ransomware known as Cronus. In this case, the malware is developed in PowerShell and is...
Read Blog
August 6, 2024
Featured Authors
  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director of Quick Heal Technologies...

    Read more..
  • Mahua Chakrabarthy
    Mahua Chakrabarthy

    A tea connoisseur who firmly believes that life is too short for dull content....

    Read more..
Topics
apt (20) Cyber-attack (36) cyber-attacks (58) cyberattack (16) cyberattacks (13) Cybersecurity (324) cyber security (32) Cyber threat (33) cyber threats (48) Data (11) data breach (55) data breaches (28) data loss (28) data loss prevention (34) data privacy (12) data protection (25) data security (15) DLP (49) Encryption (16) endpoint security (108) Enterprise security (17) Exploit (14) firewall (11) GDPR (12) hackers (11) malware (76) malware attack (23) malware attacks (12) MDM (25) Microsoft (15) Network security (22) Patch Management (12) phishing (27) Ransomware (67) ransomware attack (30) ransomware attacks (30) ransomware protection (14) security (11) Seqrite (33) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (16) windows (11)
Loading
Resources
  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies
About Us
  • About Seqrite
  • Leadership
  • Awards & Certifications
  • Newsroom
Archives
  • By Date
  • By Category
Loading

© 2025 Quick Heal Technologies Ltd. Cookie Policies Privacy Policies