• News
  • Security
  • Products
  • About Seqrite
Blogs on Information Technology, Network & Cybersecurity | Seqrite Blog
  • News
  • Security
  • Products
  • About Seqrite

Monthly Archive:: January 2025

Exposed SMB: The Hidden Risk Behind ‘WantToCry’ Ransomware Attacks

Exposed SMB: The Hidden Risk Behind ‘WantToCry’ Ransomware Attacks

Estimated reading time: 4 minutes

Exposed SMB: The Hidden Risk Behind ‘WantToCry’ Ransomware Attacks Introduction In today’s digital landscape, ransomware attacks are evolving at an alarming rate, leveraging overlooked vulnerabilities to infiltrate systems. One such weakness is misconfigured Server Message Block (SMB) services, which...
Read Blog
January 31, 2025
1

The What, How, and Why of Data Privacy

The What, How, and Why of Data Privacy

Estimated reading time: 3 minutes

Data privacy is a cornerstone of modern business operations and consumer trust in an increasingly digital world. Every click, transaction, or interaction in the online space generates data, often containing sensitive information. Protecting this data is a regulatory requirement...
Read Blog
January 24, 2025

Unveiling Silent Lynx APT Targeting Entities Across Kyrgyzstan & Neighbouring Nations

Estimated reading time: 10 minutes

Silent Lynx APT Targets Various Entities Across Kyrgyzstan & Neighbouring Nations Contents Key Targets Industries Affected Geographical Focus Infection Chain Initial Findings Campaign 1 Looking into the malicious email Looking into decoy document. Campaign 2 Looking into the malicious...
Read Blog
January 21, 2025

Draft DPDPA Guidelines: What’s in it for Cybersecurity Leaders?

Draft DPDPA Guidelines: What’s in it for Cybersecurity Leaders?

Estimated reading time: 3 minutes

The Digital Personal Data Protection Act (DPDPA) is poised to redefine India’s cybersecurity and data protection landscape. The recent draft guidelines have sparked widespread discussions, especially among cybersecurity leaders responsible for safeguarding data and ensuring compliance. This blog explores...
Read Blog
January 10, 2025

Formbook Phishing Campaign with old Payloads

Formbook Phishing Campaign with old Payloads

Estimated reading time: 8 minutes

Recently, Seqrite Lab saw a phishing campaign delivering formbook stealers through email attachments. Formbook, as seen since 2016, has evolved in many ways from stealth features to evasion techniques. Being sold on hacking forums as Malware as a Service,...
Read Blog
January 7, 2025
Featured Authors
  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director of Quick Heal Technologies...

    Read more..
  • Mahua Chakrabarthy
    Mahua Chakrabarthy

    A tea connoisseur who firmly believes that life is too short for dull content....

    Read more..
Topics
apt (19) Cyber-attack (35) cyber-attacks (58) cyberattack (16) cyberattacks (13) Cybersecurity (322) cyber security (31) Cyber threat (33) cyber threats (48) Data (11) data breach (55) data breaches (28) data loss (28) data loss prevention (34) data privacy (11) data protection (24) data security (15) DLP (49) Encryption (16) endpoint security (107) Enterprise security (17) Exploit (14) firewall (11) GDPR (12) hackers (11) malware (76) malware attack (23) malware attacks (12) MDM (25) Microsoft (15) Network security (22) Patch Management (12) phishing (27) Ransomware (67) ransomware attack (30) ransomware attacks (30) ransomware protection (13) security (11) Seqrite (33) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (16) windows (11)
Loading
Resources
  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies
About Us
  • About Seqrite
  • Leadership
  • Awards & Certifications
  • Newsroom
Archives
  • By Date
  • By Category
Loading

© 2025 Quick Heal Technologies Ltd. Cookie Policies Privacy Policies