Estimated reading time: 11 minutes
Contents Introduction Key Targets. Industries Affected. Geographical Focus. Infection Chain. Initial Findings. Looking into the decoy-document Technical Analysis Stage 1 – Malicious LNK Script Stage 2 – DUPERUNNER Implant Stage 3 – AdaptixC2 Beacon. Infrastructural Artefacts. Conclusion SEQRITE Protection....Information Technology, Network Security & Cybersecurity Updates
Estimated reading time: 10 minutes
Operation Hanoi Thief: Threat Actor targets Vietnamese IT professionals and recruitment teams. Introduction Key Targets. Industries Affected. Geographical Focus. Infection Chain. Initial Findings Looking into the decoy-document Technical Analysis Stage 1 – Malicious LNK Script Stage 2 – Pseudo-Polyglot...Estimated reading time: 3 minutes
India’s Digital Personal Data Protection (DPDP) Act represents a significant regulatory shift that affects every Data Fiduciary handling the personal data of Indian Data Principals. With penalties reaching ₹250 crore, the Act elevates data protection from a routine compliance...
Estimated reading time: 5 minutes
India has officially notified the Digital Personal Data Protection (DPDP) Rules, 2025, turning the DPDP Act from a policy framework into an enforceable compliance regime. These rules define how organizations must collect, process, secure, and store personal data, while...Estimated reading time: 7 minutes
Introduction Redis is an open-source, in-memory data store widely used as a cache, message broker, and high-performance NoSQL database. It offers rich data structures like strings, hashes, lists, sets, sorted sets, bitmaps, HyperLogLogs, and streams, backed by atomic operations...
Estimated reading time: 4 minutes
India’s banking ecosystem has witnessed remarkable digital progress in recent years, with rural and cooperative banks playing a pivotal role in this transformation. From Aadhaar-enabled payments to mobile banking, these institutions have played a crucial role in bringing financial...
Estimated reading time: 4 minutes
India’s Banking, Financial Services, and Insurance (BFSI) industry stands at the intersection of innovation and risk. From UPI and digital wallets to AI-based lending and predictive underwriting, digital transformation is no longer a differentiator — it’s the operating model...
Estimated reading time: 17 minutes
Introduction Timeline Key Targets. Industries Affected. Geographical Focus. Infection Chain. Initial Findings. Technical Analysis. Campaign – I The LNK Way. Malicious SILENT LOADER Malicious LAPLAS Implant – TCP & TLS. Malicious .NET Implant – SilentSweeper Campaign – II Malicious...
Estimated reading time: 7 minutes
Authors: Sathwik Ram Prakki and Kartikkumar Jivani Contents Introduction Key Targets Industries Geographical Focus Infection and Decoys Technical Analysis PowerShell Stage Persistence Configuration Infrastructure and Attribution Conclusion SEQRITE Protection IOCs MITRE ATT&CK Introduction SEQRITE Labs has identified a campaign...