• News
  • Security
  • Products
  • About Seqrite
Blogs on Information Technology, Network & Cybersecurity | Seqrite Blog
  • News
  • Security
  • Products
  • About Seqrite
Home  /  Author
Seqrite

About Seqrite

Follow us for the latest updates and insights related to security for enterprise networks. Subscribe to our newsletter to stay updated.

Building Trust with Data: Data Privacy Basics for Business Leaders

Building Trust with Data: Data Privacy Basics for Business Leaders

Estimated reading time: 4 minutes

Introduction In today’s digital-first economy, data has become the backbone of every business operation—from customer onboarding and marketing to employee management and vendor coordination. Every digital interaction generates data. But with this opportunity comes responsibility: how that data is...
Read Blog
October 28, 2025

Anatomy of the Red Hat Intrusion: Crimson Collective and SLSH Extortions

Anatomy of the Red Hat Intrusion: Crimson Collective and SLSH Extortions

Estimated reading time: 10 minutes

Introduction In August 2025, a Telegram channel named “Scattered LAPSUS$ Hunters” surfaced, linking itself to notorious cybercrime groups: Scattered Spider, ShinyHunters, and LAPSUS$. The group quickly began posting stolen data, ransom demands, and provocative statements, reviving chaos once driven...
Read Blog
October 24, 2025

Individual Rights in Data Privacy — What Enterprises Need to Know

Individual Rights in Data Privacy — What Enterprises Need to Know

Estimated reading time: 3 minutes

Every click. Every swipe. Every “Add to Cart.” Behind each digital interaction lies a fragment of consumer data — a piece of someone’s identity in the connected world. For enterprises, the real question is no longer what data they...
Read Blog
October 14, 2025

Why AI Assistance in SecOps is Your Missing Security Shield 

Why AI Assistance in SecOps is Your Missing Security Shield 

Estimated reading time: 3 minutes

Introduction: A Security Crisis That Keeps Leaders Awake Did you know that 97% of security professionals admit to losing sleep over potentially missed critical alerts? (Ponemon Institute) It’s not just paranoia—the risk is real. Security operations centers (SOCs) are...
Read Blog
September 11, 2025

Critical Role of Mobile Device Management (MDM) in Organizations Today

Critical Role of Mobile Device Management (MDM) in Organizations Today

Estimated reading time: 3 minutes

 In an increasingly mobile-first world, organizations are leveraging mobile devices for a variety of operational needs – making them indispensable tools for business productivity.  Whether it’s sales reps using tablets in the field, managers accessing dashboards from their phones,...
Read Blog
September 10, 2025

Google Salesforce Breach: A Deep dive into the chain and extent of the compromise

Google Salesforce Breach: A Deep dive into the chain and extent of the compromise

Estimated reading time: 10 minutes

Executive Summary In early June 2025, Google’s corporate Salesforce instance (used to store contact data for small‑ and medium‑sized business clients) was compromised through a sophisticated vishing‑extortion campaign orchestrated by the threat‑group tracked as UNC6040 & UNC6240 (online cybercrime collective known...
Read Blog
September 2, 2025

Operation Sindoor – Anatomy of a Digital Siege

Operation Sindoor – Anatomy of a Digital Siege

Estimated reading time: 5 minutes

Overview Seqrite Labs,  India’s largest Malware Analysis lab, has identified multiple cyber events linked to Operation Sindoor, involving state-sponsored APT activity and coordinated hacktivist operations. Observed tactics included spear phishing, deployment of malicious scripts, website defacements, and unauthorized data...
Read Blog
May 23, 2025

Beyond Passwords: Is Your System Truly Secure?

Beyond Passwords: Is Your System Truly Secure?

Estimated reading time: 3 minutes

The cybersecurity landscape is constantly evolving, with traditional methods of securing user accounts—such as passwords—proving increasingly inadequate against the growing sophistication of cyberattacks. In response, authentication systems that go Beyond Passwords, i.e., password-less, have emerged as a promising solution....
Read Blog
March 12, 2025

Ransomware Attack Over Publicly Shared SMB2 Connections and Staying Protected with Seqrite

Ransomware Attack Over Publicly Shared SMB2 Connections and Staying Protected with Seqrite

Estimated reading time: 3 minutes

Ransomware continues to evolve as one of the most devastating cybersecurity threats, and attackers are finding new ways to exploit vulnerabilities. One such method involves targeting publicly shared SMB2 (Server Message Block version 2) connections. SMB, widely used for...
Read Blog
March 11, 2025

How Attackers Exploit BitLocker: Turning Legitimate Tools into Ransomware Weapons

How Attackers Exploit BitLocker: Turning Legitimate Tools into Ransomware Weapons

Estimated reading time: 3 minutes

Introduction The ransomware landscape is evolving rapidly, with attackers constantly refining their techniques to outwit security defenses. One alarming trend is the weaponization of trusted tools like Microsoft’s BitLocker. Originally designed to safeguard sensitive data through encryption, BitLocker is...
Read Blog
March 11, 2025
1 2 … 43 Next →
Featured Authors
  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director of Quick Heal Technologies...

    Read more..
  • Mahua Chakrabarthy
    Mahua Chakrabarthy

    A tea connoisseur who firmly believes that life is too short for dull content....

    Read more..
Topics
apt (23) BYOD (11) Cyber-attack (36) cyber-attacks (58) cyberattack (16) cyberattacks (15) Cybersecurity (332) cyber security (34) Cyber threat (33) cyber threats (49) data breach (56) data breaches (29) data loss (28) data loss prevention (33) data privacy (13) data protection (28) data security (15) DLP (49) Encryption (16) endpoint security (110) Enterprise security (18) Exploit (13) GDPR (13) malware (76) malware analysis (12) malware attack (23) malware attacks (12) MDM (27) Microsoft (15) mobile device management (11) Network security (23) Patch Management (12) phishing (29) Ransomware (69) ransomware attack (30) ransomware attacks (30) ransomware protection (14) security (11) Seqrite (37) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (16) zero trust (12)
Loading
Resources
  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies
About Us
  • About Seqrite
  • Leadership
  • Awards & Certifications
  • Newsroom
Archives
  • By Date
  • By Category
Loading

© 2025 Quick Heal Technologies Ltd. Cookie Policies Privacy Policies