• News
  • Security
  • Products
  • About Seqrite
Blogs on Information Technology, Network & Cybersecurity | Seqrite Blog
  • News
  • Security
  • Products
  • About Seqrite
Home  /  Author
Seqrite

About Seqrite

Seqrite is a leading enterprise cybersecurity solutions provider. With a focus on simplifying cybersecurity, Seqrite delivers comprehensive solutions and services through our patented, AI/ML-powered tech stack to protect businesses against the latest threats by securing devices, applications, networks, cloud, data, and identity. Seqrite is the Enterprise arm of the global cybersecurity brand, Quick Heal Technologies Limited, the only listed cybersecurity products and solutions company in India. Today, 30,000+ enterprises in more than 70+ countries trust Seqrite with their cybersecurity needs.

Deploy a layered security model through Seqrite!

Deploy a layered security model through Seqrite!

Estimated reading time: 2 minutes

To understand the concept of layered security, it’s important to remember a key tenet of cybersecurity – no security solution is infallible. As security experts state, it’s not a question of how, but when. Cybercrooks are evolving everyday to...
Read Blog
September 17, 2020

Did you know that adversaries are planning to steal your data?

Did you know that adversaries are planning to steal your data?

Estimated reading time: 2 minutes

How valuable is data? A good way to answer that question is to look at the average cost of a data breach. Recent research in May 2020 found that the average cost of a data breach was USD 3.92...
Read Blog
September 11, 2020

Ruthless Valak snowballs into an enterprise’s worst nightmare.

Ruthless Valak snowballs into an enterprise’s worst nightmare.

Estimated reading time: 2 minutes

A new and deadlier version of a familiar malware —it was discovered in 2019 and designated a sophisticated piece of malware, Valak was considered a type of malware loader, a type of program used to load other malware on...
Read Blog
September 9, 2020

Cybersecurity below the kernel

Cybersecurity below the kernel

Estimated reading time: 2 minutes

Security of a computing endpoint is traditionally viewed with respect to Firewall, HIPS, AV Products, etc. This perspective though misses out on “Below Kernel” aspects of cyber threats, which may target Hypervisor, Firmware or Hardware itself. Here are some...
Read Blog
August 27, 2020

PonyFinal Ransomware dubbed by many as the modern-day Trojan horse.

PonyFinal Ransomware dubbed by many as the modern-day Trojan horse.

Estimated reading time: 2 minutes

Microsoft recently warned its over 100,000 followers about the emergence of a new human-operated Java-based ransomware that has been involved in targeted attacks in the US, India and Iran. PonyFinal, the name of this malware, is an example of...
Read Blog
August 26, 2020

Legacy Systems longing for enterprise attention?

Legacy Systems longing for enterprise attention?

Estimated reading time: 3 minutes

Legacy systems such as mainframes may be considered outdated by today’s standards but they continue to play major roles in many sectors, primarily finance, government, retail, healthcare and insurance. In these industries, they are crucial parts of day-to-day operations,...
Read Blog
August 6, 2020

Is your router exposed to cyber threats? Here is how to safeguard it.

Is your router exposed to cyber threats? Here is how to safeguard it.

Estimated reading time: 4 minutes

Routers are extremely vulnerable to cyberattacks. Here’s how to safeguard them Given that a large number of people use a router to connect to web, chances are that may be you using a router at home to access the...
Read Blog
July 30, 2020

Are industrial whales getting massacred by spear-phishing?

Are industrial whales getting massacred by spear-phishing?

Estimated reading time: 2 minutes

Supply chains and industrial enterprises are being targeted through a series of ongoing spear-phishing attacks. This recent campaign, observed on systems within Germany, United States and Japan thus far, operates through the obfuscation of malware on public, legitimate sources....
Read Blog
July 28, 2020

Hackers steal e-commerce databases, demand Bitcoin as ransom.

Hackers steal e-commerce databases, demand Bitcoin as ransom.

Estimated reading time: 2 minutes

E-commerce platforms have always been a favourite target for hackers. The recent months have brought into attention a new campaign by malicious hackers to penetrate insecure servers of e-commerce platforms, steal their databases and then demand Bitcoin to return...
Read Blog
July 16, 2020

Is the education sector turning a blind eye to cyberthreats emerging from a remote working model?

Is the education sector turning a blind eye to cyberthreats emerging from a remote working model?

Estimated reading time: 2 minutes

In recent times, the education sector has seen an upsurge in the number of cyberthreats. Seqrite’s Threat Report Q3 2019 found that the education sector saw the largest number of cyberthreats between July and September 2019, accounting for 30%...
Read Blog
June 30, 2020
← Previous 1 … 7 8 9 … 43 Next →
Featured Authors
  • Seqrite
    Seqrite

    Seqrite is a leading enterprise cybersecurity solutions provider. With a focus...

    Read more..
  • Jyoti Karlekar
    Jyoti Karlekar

    I'm an avid writer who enjoys crafting content about emerging technologies and...

    Read more..
  • Bineesh P
    Bineesh P

    I am a passionate cybersecurity enthusiast and a dedicated writer. With a knack...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director of Quick Heal Technologies...

    Read more..
Topics
apt (25) Cyber-attack (36) cyber-attacks (58) cyberattack (16) cyberattacks (15) Cybersecurity (335) cyber security (34) Cyber threat (33) cyber threats (50) data breach (56) data breaches (29) data loss (28) data loss prevention (33) data privacy (15) data protection (30) data security (15) DLP (49) DPDP (13) DPDPA (15) Encryption (16) endpoint security (110) Enterprise security (18) Exploit (13) GDPR (13) malware (76) malware analysis (13) malware attack (23) malware attacks (12) MDM (27) Microsoft (15) Network security (24) Patch Management (12) phishing (29) Ransomware (69) ransomware attack (30) ransomware attacks (30) ransomware protection (14) Seqrite (40) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) Threat Intelligence (13) UTM (34) Vulnerability (16) zero trust (13)
Loading
Blogs on Information Technology, Network & Cybersecurity | Seqrite

Leading enterprise IT security solutions provider simplifying endpoint, data, and network security with best-in-class threat prevention, detection, and response solutions worldwide.

Read More

Follow us:

Subscribe To Our Newsletter

Stay informed about the latest cybersecurity trends and insights.

Loading
Products & Services
  • Cloud
  • Endpoint Protection
  • Endpoint Detection and Response
  • Mobile Device Management
  • BYOD
  • Extended Detection and Response
  • Zero Trust Network Access
  • Data Privacy
  • On Prem
  • Endpoint Protection
  • Endpoint Detection and Response
  • Data Privacy
  • Platform
  • Malware Analysis Platform
  • Micro Business
  • SOHO Total Edition
  • Services
  • Threat Intel
  • Digital Risk Protection Services (DRPS)
  • Ransomware Recovery as a Services (RRaaS)
  • DPDP Compliance
  • Managed Detection and Response
Resources
  • Blogs
  • Whitepapers
  • Datasheets
  • Threat Reports
  • Manuals
  • Policy & Compliance
  • EULA
  • PoV
  • GoDeep.AI
Contact Us
  • Registered Offices
  • Nearest Offices
  • Let’s Talk Cybersecurity
Support
  • Technical Support
  • Download Software
  • Offline Updater
  • Firmware Upgrades
  • Upgrades
  • Product Documentation
About Us
  • About Seqrite
  • Leadership
  • Awards & Recognition
  • Newsroom
Partner
  • Partner Program
  • Locate Partner
  • Become A Partner
  • Seqrite Certification

© 2026 Quick Heal Technologies Ltd. Cookie Policies Privacy Policies