• News
  • Security
  • Products
  • About Seqrite
Blogs on Information Technology, Network & Cybersecurity | Seqrite Blog
  • News
  • Security
  • Products
  • About Seqrite
Home  /  Author
Seqrite

About Seqrite

Follow us for the latest updates and insights related to security for enterprise networks. Subscribe to our newsletter to stay updated.

How Attackers Exploit BitLocker: Turning Legitimate Tools into Ransomware Weapons

How Attackers Exploit BitLocker: Turning Legitimate Tools into Ransomware Weapons

Estimated reading time: 3 minutes

Introduction The ransomware landscape is evolving rapidly, with attackers constantly refining their techniques to outwit security defenses. One alarming trend is the weaponization of trusted tools like Microsoft’s BitLocker. Originally designed to safeguard sensitive data through encryption, BitLocker is...
Read Blog
March 11, 2025

Digital Arrest Scam in India: How Cyber Criminals Exploit Fear to Deceive Victims

Digital Arrest Scam in India:  How Cyber Criminals Exploit Fear to Deceive Victims

Estimated reading time: 3 minutes

Cyber criminals in India are constantly evolving their tactics to exploit fear and trust. One alarming trend is the “Digital Arrest Scam,” where fraudsters impersonate law enforcement agencies or government officials to extort money or sensitive information. These scams...
Read Blog
February 28, 2025

Phishing 2.0: New Techniques Cybercriminals Use to Trick Victims

Phishing 2.0: New Techniques Cybercriminals Use to Trick Victims

Estimated reading time: 3 minutes

Phishing has drastically transformed from its early days as a simple scam targeting unwary email users. Modern phishing techniques—dubbed “Phishing 2.0″—are more complex, highly tailored, and designed to bypass even the most robust security systems. In this blog, we’ll...
Read Blog
February 28, 2025

The Critical Importance of Cyber Securing ISRO’s Space Missions

The Critical Importance of Cyber Securing ISRO’s Space Missions

Estimated reading time: 3 minutes

In a monumental leap for India’s space exploration journey, the Indian Space Research Organisation (ISRO) has captured the world’s attention with its successful Chandrayaan 3 moon landing. The culmination of meticulous planning, dedication, and scientific prowess, this achievement marks...
Read Blog
August 24, 2023

Threat Advisory: Mallox Ransomware Strikes Unsecured MSSQL Servers

Threat Advisory: Mallox Ransomware Strikes Unsecured MSSQL Servers

Estimated reading time: 3 minutes

We have observed a sudden increase in Ransomware incidents since June 2023, involving the appending of the “.malox” file extension to encrypt files. This Ransomware has been identified as a variant of the Mallox (aka TargetCompany) Ransomware Family. The...
Read Blog
August 4, 2023

Unseen Threats Lurking: Protect Your Small Business from Cyberattacks with the Right Defence Strategy

Unseen Threats Lurking: Protect Your Small Business from Cyberattacks with the Right Defence Strategy

Estimated reading time: 5 minutes

The pandemic has expedited digital transformation, making technology and data pivotal to most businesses. However, it has also increased cyber threats, especially for small and medium-sized enterprises (SMBs). In addition, data regulations have also become more stringent, with fines...
Read Blog
April 25, 2023

Expiro: Old Virus Resurfaces to Cast New Challenge

Expiro: Old Virus Resurfaces to Cast New Challenge

Estimated reading time: 6 minutes

A recent virus infection faced by some users was swiftly detected as being caused by Expiro. We have conducted an in-depth investigation and analysis of the intricacies of Expiro and what makes it such a potent threat. This article...
Read Blog
February 27, 2023

Your Data and Devices are safe with SEQRITE

Your Data and Devices are safe with SEQRITE

Estimated reading time: 2 minutes

On 19th November at 8:17 am, we became aware of a false positive detection on excel files and the same getting quarantined on some customer devices. We sincerely regret the inconvenience caused. We immediately took necessary actions investigating the matter,...
Read Blog
November 19, 2022

9 Best Practices to Avoid Ransomware Infection

9 Best Practices to Avoid Ransomware Infection

Estimated reading time: 7 minutes

9 Best Practices to Avoid Ransomware Infection Individuals and organizations must implement the best cybersecurity practices to avoid ransomware infection and data loss. In the past few years, ransomware has become a menace due to various platforms on the...
Read Blog
October 10, 2022

Securing Cybersecurity for Enterprises and SMBs

Securing Cybersecurity for Enterprises and SMBs

Estimated reading time: 2 minutes

SEQRITE HawkkEye and MSSP Portal: One-stop-shop for the complete cybersecurity needs of Enterprises & SMBs   A few years ago, enterprises or SMBs would have scoffed at the notion of having a cybersecurity strategy in place to recover their...
Read Blog
July 14, 2022
← Previous 1 2 3 … 43 Next →
Featured Authors
  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director of Quick Heal Technologies...

    Read more..
  • Mahua Chakrabarthy
    Mahua Chakrabarthy

    A tea connoisseur who firmly believes that life is too short for dull content....

    Read more..
Topics
apt (24) BYOD (11) Cyber-attack (36) cyber-attacks (58) cyberattack (16) cyberattacks (15) Cybersecurity (332) cyber security (34) Cyber threat (33) cyber threats (50) data breach (56) data breaches (29) data loss (28) data loss prevention (33) data privacy (13) data protection (28) data security (15) DLP (49) Encryption (16) endpoint security (110) Enterprise security (18) Exploit (13) GDPR (13) malware (76) malware analysis (13) malware attack (23) malware attacks (12) MDM (27) Microsoft (15) Network security (23) Patch Management (12) phishing (29) Ransomware (69) ransomware attack (30) ransomware attacks (30) ransomware protection (14) security (11) Seqrite (37) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) Threat Intelligence (12) UTM (34) Vulnerability (16) zero trust (12)
Loading
Resources
  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies
About Us
  • About Seqrite
  • Leadership
  • Awards & Certifications
  • Newsroom
Archives
  • By Date
  • By Category
Loading

© 2025 Quick Heal Technologies Ltd. Cookie Policies Privacy Policies