• News
  • Security
  • Products
  • About Seqrite
Blogs on Information Technology, Network & Cybersecurity | Seqrite Blog
  • News
  • Security
  • Products
  • About Seqrite
Home  /  Author
Seqrite

About Seqrite

Seqrite is a leading enterprise cybersecurity solutions provider. With a focus on simplifying cybersecurity, Seqrite delivers comprehensive solutions and services through our patented, AI/ML-powered tech stack to protect businesses against the latest threats by securing devices, applications, networks, cloud, data, and identity. Seqrite is the Enterprise arm of the global cybersecurity brand, Quick Heal Technologies Limited, the only listed cybersecurity products and solutions company in India. Today, 30,000+ enterprises in more than 70+ countries trust Seqrite with their cybersecurity needs.

DPDP Rules Are Here: What Changed from the Draft?

DPDP Rules Are Here: What Changed from the Draft?

Estimated reading time: 5 minutes

India has officially notified the Digital Personal Data Protection (DPDP) Rules, 2025, turning the DPDP Act from a policy framework into an enforceable compliance regime. These rules define how organizations must collect, process, secure, and store personal data, while...
Read Blog
November 14, 2025

Securing India’s Financial Future: Why the DPDP Act is a Game-Changer for BFSI

Securing India’s Financial Future: Why the DPDP Act is a Game-Changer for BFSI

Estimated reading time: 4 minutes

India’s Banking, Financial Services, and Insurance (BFSI) industry stands at the intersection of innovation and risk. From UPI and digital wallets to AI-based lending and predictive underwriting, digital transformation is no longer a differentiator — it’s the operating model...
Read Blog
November 5, 2025

Building Trust with Data: Data Privacy Basics for Business Leaders

Building Trust with Data: Data Privacy Basics for Business Leaders

Estimated reading time: 4 minutes

Introduction In today’s digital-first economy, data has become the backbone of every business operation—from customer onboarding and marketing to employee management and vendor coordination. Every digital interaction generates data. But with this opportunity comes responsibility: how that data is...
Read Blog
October 28, 2025

Anatomy of the Red Hat Intrusion: Crimson Collective and SLSH Extortions

Anatomy of the Red Hat Intrusion: Crimson Collective and SLSH Extortions

Estimated reading time: 10 minutes

Introduction In August 2025, a Telegram channel named “Scattered LAPSUS$ Hunters” surfaced, linking itself to notorious cybercrime groups: Scattered Spider, ShinyHunters, and LAPSUS$. The group quickly began posting stolen data, ransom demands, and provocative statements, reviving chaos once driven...
Read Blog
October 24, 2025

Individual Rights in Data Privacy — What Enterprises Need to Know

Individual Rights in Data Privacy — What Enterprises Need to Know

Estimated reading time: 3 minutes

Every click. Every swipe. Every “Add to Cart.” Behind each digital interaction lies a fragment of consumer data — a piece of someone’s identity in the connected world. For enterprises, the real question is no longer what data they...
Read Blog
October 14, 2025

Why AI Assistance in SecOps is Your Missing Security Shield 

Why AI Assistance in SecOps is Your Missing Security Shield 

Estimated reading time: 3 minutes

Introduction: A Security Crisis That Keeps Leaders Awake Did you know that 97% of security professionals admit to losing sleep over potentially missed critical alerts? (Ponemon Institute) It’s not just paranoia—the risk is real. Security operations centers (SOCs) are...
Read Blog
September 11, 2025

Critical Role of Mobile Device Management (MDM) in Organizations Today

Critical Role of Mobile Device Management (MDM) in Organizations Today

Estimated reading time: 3 minutes

 In an increasingly mobile-first world, organizations are leveraging mobile devices for a variety of operational needs – making them indispensable tools for business productivity.  Whether it’s sales reps using tablets in the field, managers accessing dashboards from their phones,...
Read Blog
September 10, 2025

Google Salesforce Breach: A Deep dive into the chain and extent of the compromise

Google Salesforce Breach: A Deep dive into the chain and extent of the compromise

Estimated reading time: 10 minutes

Executive Summary In early June 2025, Google’s corporate Salesforce instance (used to store contact data for small‑ and medium‑sized business clients) was compromised through a sophisticated vishing‑extortion campaign orchestrated by the threat‑group tracked as UNC6040 & UNC6240 (online cybercrime collective known...
Read Blog
September 2, 2025

Operation Sindoor – Anatomy of a Digital Siege

Operation Sindoor – Anatomy of a Digital Siege

Estimated reading time: 5 minutes

Overview Seqrite Labs,  India’s largest Malware Analysis lab, has identified multiple cyber events linked to Operation Sindoor, involving state-sponsored APT activity and coordinated hacktivist operations. Observed tactics included spear phishing, deployment of malicious scripts, website defacements, and unauthorized data...
Read Blog
May 23, 2025

Beyond Passwords: Is Your System Truly Secure?

Beyond Passwords: Is Your System Truly Secure?

Estimated reading time: 3 minutes

The cybersecurity landscape is constantly evolving, with traditional methods of securing user accounts—such as passwords—proving increasingly inadequate against the growing sophistication of cyberattacks. In response, authentication systems that go Beyond Passwords, i.e., password-less, have emerged as a promising solution....
Read Blog
March 12, 2025
1 2 … 43 Next →
Featured Authors
  • Seqrite
    Seqrite

    Seqrite is a leading enterprise cybersecurity solutions provider. With a focus...

    Read more..
  • Jyoti Karlekar
    Jyoti Karlekar

    I'm an avid writer who enjoys crafting content about emerging technologies and...

    Read more..
  • Bineesh P
    Bineesh P

    I am a passionate cybersecurity enthusiast and a dedicated writer. With a knack...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director of Quick Heal Technologies...

    Read more..
Topics
apt (24) BYOD (11) Cyber-attack (36) cyber-attacks (58) cyberattack (16) cyberattacks (15) Cybersecurity (333) cyber security (34) Cyber threat (33) cyber threats (50) data breach (56) data breaches (29) data loss (28) data loss prevention (33) data privacy (13) data protection (29) data security (15) DLP (49) Encryption (16) endpoint security (110) Enterprise security (18) Exploit (13) GDPR (13) malware (76) malware analysis (13) malware attack (23) malware attacks (12) MDM (27) Microsoft (15) Network security (24) Patch Management (12) phishing (29) Ransomware (69) ransomware attack (30) ransomware attacks (30) ransomware protection (14) security (11) Seqrite (37) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) Threat Intelligence (12) UTM (34) Vulnerability (16) zero trust (13)
Loading
Resources
  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies
About Us
  • About Seqrite
  • Leadership
  • Awards & Certifications
  • Newsroom
Archives
  • By Date
  • By Category
Loading

© 2025 Quick Heal Technologies Ltd. Cookie Policies Privacy Policies