• News
  • Security
  • Products
  • About Seqrite
Blogs on Information Technology, Network & Cybersecurity | Seqrite Blog
  • News
  • Security
  • Products
  • About Seqrite
Home  /  Author
Seqrite

About Seqrite

Follow us for the latest updates and insights related to security for enterprise networks. Subscribe to our newsletter to stay updated.

Cybersecurity below the kernel

Cybersecurity below the kernel

Estimated reading time: 2 minutes

Security of a computing endpoint is traditionally viewed with respect to Firewall, HIPS, AV Products, etc. This perspective though misses out on “Below Kernel” aspects of cyber threats, which may target Hypervisor, Firmware or Hardware itself. Here are some...
Read Blog
August 27, 2020

PonyFinal Ransomware dubbed by many as the modern-day Trojan horse.

PonyFinal Ransomware dubbed by many as the modern-day Trojan horse.

Estimated reading time: 2 minutes

Microsoft recently warned its over 100,000 followers about the emergence of a new human-operated Java-based ransomware that has been involved in targeted attacks in the US, India and Iran. PonyFinal, the name of this malware, is an example of...
Read Blog
August 26, 2020

Legacy Systems longing for enterprise attention?

Legacy Systems longing for enterprise attention?

Estimated reading time: 3 minutes

Legacy systems such as mainframes may be considered outdated by today’s standards but they continue to play major roles in many sectors, primarily finance, government, retail, healthcare and insurance. In these industries, they are crucial parts of day-to-day operations,...
Read Blog
August 6, 2020

Is your router exposed to cyber threats? Here is how to safeguard it.

Is your router exposed to cyber threats? Here is how to safeguard it.

Estimated reading time: 4 minutes

Routers are extremely vulnerable to cyberattacks. Here’s how to safeguard them Given that a large number of people use a router to connect to web, chances are that may be you using a router at home to access the...
Read Blog
July 30, 2020

Are industrial whales getting massacred by spear-phishing?

Are industrial whales getting massacred by spear-phishing?

Estimated reading time: 2 minutes

Supply chains and industrial enterprises are being targeted through a series of ongoing spear-phishing attacks. This recent campaign, observed on systems within Germany, United States and Japan thus far, operates through the obfuscation of malware on public, legitimate sources....
Read Blog
July 28, 2020

Hackers steal e-commerce databases, demand Bitcoin as ransom.

Hackers steal e-commerce databases, demand Bitcoin as ransom.

Estimated reading time: 2 minutes

E-commerce platforms have always been a favourite target for hackers. The recent months have brought into attention a new campaign by malicious hackers to penetrate insecure servers of e-commerce platforms, steal their databases and then demand Bitcoin to return...
Read Blog
July 16, 2020

Is the education sector turning a blind eye to cyberthreats emerging from a remote working model?

Is the education sector turning a blind eye to cyberthreats emerging from a remote working model?

Estimated reading time: 2 minutes

In recent times, the education sector has seen an upsurge in the number of cyberthreats. Seqrite’s Threat Report Q3 2019 found that the education sector saw the largest number of cyberthreats between July and September 2019, accounting for 30%...
Read Blog
June 30, 2020

Enterprises using Microsoft’s collaboration tools under attack?

Enterprises using Microsoft’s collaboration tools under attack?

Estimated reading time: 2 minutes

Enterprise collaboration tools have seen an upsurge in popularity this year, thanks to the global pandemic forcing organizations all over the world to work from home. Even as the economy takes the initial step towards resumption, the days of...
Read Blog
June 24, 2020

What are the attack channels used by adversaries to target the manufacturing sector during the Coronavirus pandemic?

What are the attack channels used by adversaries to target the manufacturing sector during the Coronavirus pandemic?

Estimated reading time: 2 minutes

The onset of the coronavirus (COVID-19) pandemic and the resultant social distancing measures across the world has had a sobering effect on the manufacturing industry. Large-scale plants have shuttered down and with demand at a historical low, the economic...
Read Blog
June 11, 2020

When will IT & ITes businesses understand the data breach dangers from a work from home staff?

When will IT & ITes businesses understand the data breach dangers from a work from home staff?

Estimated reading time: 2 minutes

The unprecedented rise of a work from home staff has greatly increased the risk of data breaches for the IT/ITes sector. With companies forced to mandate Work From Home (WFH) for its employees in the face of the global...
Read Blog
June 9, 2020
← Previous 1 … 6 7 8 … 42 Next →
Featured Authors
  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director of Quick Heal Technologies...

    Read more..
  • Mahua Chakrabarthy
    Mahua Chakrabarthy

    A tea connoisseur who firmly believes that life is too short for dull content....

    Read more..
Topics
apt (19) Cyber-attack (35) cyber-attacks (58) cyberattack (16) cyberattacks (13) Cybersecurity (322) cyber security (31) Cyber threat (33) cyber threats (48) Data (11) data breach (55) data breaches (28) data loss (28) data loss prevention (34) data privacy (11) data protection (24) data security (15) DLP (49) Encryption (16) endpoint security (107) Enterprise security (17) Exploit (14) firewall (11) GDPR (12) hackers (11) malware (76) malware attack (23) malware attacks (12) MDM (25) Microsoft (15) Network security (22) Patch Management (12) phishing (27) Ransomware (67) ransomware attack (30) ransomware attacks (30) ransomware protection (13) security (11) Seqrite (33) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (16) windows (11)
Loading
Resources
  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies
About Us
  • About Seqrite
  • Leadership
  • Awards & Certifications
  • Newsroom
Archives
  • By Date
  • By Category
Loading

© 2025 Quick Heal Technologies Ltd. Cookie Policies Privacy Policies