• News
  • Security
  • Products
  • About Seqrite
Blogs on Information Technology, Network & Cybersecurity | Seqrite Blog
  • News
  • Security
  • Products
  • About Seqrite
Home  /  Author
Rajib Singha

About Rajib Singha

Follow

Rajib is an IT security news junkie and a computer security blogger at Quick Heal. He is passionate about promoting cybersecurity awareness, content and digital marketing, photography, gaming, and gardening.

Seqrite Endpoint Security supports the Windows 10 April 2018 Update

Seqrite Endpoint Security supports the Windows 10 April 2018 Update

Estimated reading time: < 1 minute

Microsoft has released the Windows 10 April 2018 Update. This post tells you what are the highlights of this particular update and the compatibility of Seqrite Endpoint Security with the OS. Highlights of the Windows 10 April 2018 Update...
Read Blog
May 11, 2018

Ransomware Alert! Follow these steps to secure your system against an ongoing ransomware attack

Ransomware Alert! Follow these steps to secure your system against an ongoing ransomware attack

Estimated reading time: 4 minutes

Quick Heal has detected an ongoing ransomware attack. This post outlines the important steps you must take to protect your computer(s) against this threat. What to do to stay safe from the attack? Most of the steps mentioned below...
Read Blog
April 25, 2018
11
Shares

What is ‘fileless malware’ and why it could be the biggest threat to your business?

What is ‘fileless malware’ and why it could be the biggest threat to your business?

Estimated reading time: 2 minutes

What is a fileless malware? First, let’s understand how a traditional antivirus works: During a malware attack, a malicious executable file or a script is placed on the computer’s hard drive. The antivirus gets into action and analyzes this...
Read Blog
April 24, 2018
3
Shares
1

How important are security patches and updates

How important are security patches and updates

Estimated reading time: 3 minutes

Security vulnerabilities are increasing and just not so long before, we had to deal with so many of them. Remember WannaCry? In this post, we will discuss some important case in points with respect to security vulnerabilities and how...
Read Blog
April 23, 2018
5
Shares

Seqrite is compatible with Microsoft’s Jan 3 update for Meltdown and Spectre

Seqrite is compatible with Microsoft’s Jan 3 update for Meltdown and Spectre

Estimated reading time: 2 minutes

This is an important advisory for our readers about the recently discovered CPU exploits called Meltdown and Spectre. As per the recent disclosure of Meltdown and Spectre vulnerability in popular CPUs, successful exploitation of these vulnerabilities will potentially allow...
Read Blog
January 10, 2018
3
Shares

What do we need to know about the CPU vulnerabilities Meltdown and Spectre?

What do we need to know about the CPU vulnerabilities Meltdown and Spectre?

Estimated reading time: 2 minutes

What exactly is a vulnerability? A security vulnerability (also known as a security hole) is a security flaw detected in a product that may leave it open to hackers and malware. Using such vulnerabilities, attackers can exploit the affected...
Read Blog
January 5, 2018
9
Shares
3

Seqrite Endpoint Security Enterprise Suite receives BEST+++ certification from AVLab in Fileless Malware Protection Test

Seqrite Endpoint Security Enterprise Suite receives BEST+++ certification from AVLab in Fileless Malware Protection Test

Estimated reading time: 2 minutes

AVLab is an independent organization that conducts tests on security software for corporate networks and individual user devices. These tests are conducted by using malicious software, tools, and bypassing security techniques that are used in real cyberattacks. In October...
Read Blog
December 7, 2017
1
Share

A fileless malware uses a unique technique – an analysis by Quick Heal Security Labs

A fileless malware uses a unique technique – an analysis by Quick Heal Security Labs

Estimated reading time: 3 minutes

Spam email campaigns have increased with the use of multiple random techniques which improve the efficiency of payload distribution to spread malware to more number of users. These attacks have been randomly observed to have increased rapidly in numbers;...
Read Blog
October 10, 2017

Why Data Breaches should make you rethink your IT Strategy

Why Data Breaches should make you rethink your IT Strategy

Estimated reading time: 3 minutes

In this post, we give you an insight into data breach – a point-blank catastrophe that looms over most organizations. What is Data Breach? Data breach occurs when confidential data of an organization is lost or illegally obtained by...
Read Blog
September 7, 2017

An analysis of GlobeImposter Ransomware by Quick Heal Security Labs

An analysis of GlobeImposter Ransomware by Quick Heal Security Labs

Estimated reading time: 5 minutes

GlobeImposter Ransomware has been increasingly active and observed recently to be appending different suffixes to files it encrypt. A few patterns observed are using 3 random numbers such as “.492, .490, .725, .726, and .707”, random alphanumeric words such...
Read Blog
August 11, 2017
1 2 3 Next →
Featured Authors
  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director of Quick Heal Technologies...

    Read more..
  • Mahua Chakrabarthy
    Mahua Chakrabarthy

    A tea connoisseur who firmly believes that life is too short for dull content....

    Read more..
Topics
apt (19) Cyber-attack (35) cyber-attacks (58) cyberattack (16) cyberattacks (13) Cybersecurity (322) cyber security (31) Cyber threat (33) cyber threats (48) Data (11) data breach (55) data breaches (28) data loss (28) data loss prevention (34) data privacy (11) data protection (24) data security (15) DLP (49) Encryption (16) endpoint security (107) Enterprise security (17) Exploit (14) firewall (11) GDPR (12) hackers (11) malware (76) malware attack (23) malware attacks (12) MDM (25) Microsoft (15) Network security (22) Patch Management (12) phishing (27) Ransomware (67) ransomware attack (30) ransomware attacks (30) ransomware protection (13) security (11) Seqrite (33) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (16) windows (11)
Loading
Resources
  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies
About Us
  • About Seqrite
  • Leadership
  • Awards & Certifications
  • Newsroom
Archives
  • By Date
  • By Category
Loading

© 2025 Quick Heal Technologies Ltd. Cookie Policies Privacy Policies