• News
  • Security
  • Products
  • About Seqrite
Blogs on Information Technology, Network & Cybersecurity | Seqrite Blog
  • News
  • Security
  • Products
  • About Seqrite

Cybersecurity Archive

Lured and Compromised: Unmasking the Digital Danger of Honey Traps

Lured and Compromised: Unmasking the Digital Danger of Honey Traps

Estimated reading time: 5 minutes

Behind the screen, a delicate balance of trust and deception plays out. Honey traps, once the preserve of espionage, have now insidiously spread into the digital realm, capitalizing on human emotions. What starts as a harmless-looking chat or friend...
Read Blog
June 17, 2025

Operation Sindoor – Anatomy of a Digital Siege

Operation Sindoor – Anatomy of a Digital Siege

Estimated reading time: 5 minutes

Overview Seqrite Labs,  India’s largest Malware Analysis lab, has identified multiple cyber events linked to Operation Sindoor, involving state-sponsored APT activity and coordinated hacktivist operations. Observed tactics included spear phishing, deployment of malicious scripts, website defacements, and unauthorized data...
Read Blog
May 23, 2025

Advisory: Pahalgam Attack themed decoys used by APT36 to target the Indian Government

Advisory: Pahalgam Attack themed decoys used by APT36 to target the Indian Government

Estimated reading time: 6 minutes

Seqrite Labs APT team has discovered “Pahalgam Terror Attack” themed documents being used by the Pakistan-linked APT group Transparent Tribe (APT36) to target Indian Government and Defense personnel. The campaign involves both credential phishing and deployment of malicious payloads,...
Read Blog
April 30, 2025

5th January and The Tale of Joshi Virus: India’s First Global Computer Virus

5th January and The Tale of Joshi Virus: India’s First Global Computer Virus

Estimated reading time: 3 minutes

In the cinematic tapestry of cybersecurity, where tales of intrigue and innovation collide, one story emerges from the shadows of the past. It’s a story that began in the early 1990s, during the DOS era, when computer viruses were...
Read Blog
December 26, 2024

Strengthening Indian SMEs: Essential Cybersecurity Practices to Avert Rising Cyberattacks

Strengthening Indian SMEs: Essential Cybersecurity Practices to Avert Rising Cyberattacks

Estimated reading time: 2 minutes

Indian small and medium enterprises (SMEs) have been in the bull’s eye for cyberattacks lately. According to a recent study by the CyberPeace Foundation, approximately 43% of all cyberattacks target the country’s small businesses and startups. The most evident...
Read Blog
June 21, 2024

Why 60% of enterprises are moving from VPNs to Zero Trust Network Access?

Why 60% of enterprises are moving from VPNs to Zero Trust Network Access?

Estimated reading time: 4 minutes

In today’s rapidly evolving digital landscape, organizations are grappling with the challenges posed by remote and hybrid work models. As the traditional enterprise perimeter continues to erode, safeguarding sensitive data and critical applications has become a paramount concern for...
Read Blog
May 22, 2024

Pakistani APTs Escalate Attacks on Indian Gov. Seqrite Labs Unveils Threats and Connections

Pakistani APTs Escalate Attacks on Indian Gov. Seqrite Labs Unveils Threats and Connections

Estimated reading time: 11 minutes

In the recent past, cyberattacks on Indian government entities by Pakistan-linked APTs have gained significant momentum. Seqrite Labs APT team has discovered multiple such campaigns during telemetry analysis and hunting in the wild. One such threat group, SideCopy, has...
Read Blog
April 24, 2024

What is Zero Trust Security?

What is Zero Trust Security?

Estimated reading time: 4 minutes

In today’s interconnected digital world, traditional security models that rely on a secure network perimeter are no longer sufficient to protect against sophisticated cyber threats. That’s where zero trust security comes into play. Zero trust is a security strategy...
Read Blog
February 29, 2024

Cyber Security in Automotive Supply Chain: Challenges and Solutions

Cyber Security in Automotive Supply Chain: Challenges and Solutions

Estimated reading time: 3 minutes

‍The first India Cyber Threat Report 2023 revealed the automotive supply chain as the most cyberattacked sector. Over the past three to four years, the global adoption of Industry 4.0 has marked a transformative trend, witnessing extensive digitalization integration...
Read Blog
February 8, 2024

Traversing the Cyber Threat Terrain in 2024: Insights, Expert Guidance, and Collective Resilience

Traversing the Cyber Threat Terrain in 2024: Insights, Expert Guidance, and Collective Resilience

Estimated reading time: 2 minutes

The year 2023 was eventful, witnessing a myriad of advanced threats targeting prominent economies, including India. Many still remember the fake IRCTC app that stole sensitive user information or the infamous loan apps that devastated many innocent lives. Malware...
Read Blog
February 8, 2024
1 2 … 16 Next →
Featured Authors
  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director of Quick Heal Technologies...

    Read more..
  • Mahua Chakrabarthy
    Mahua Chakrabarthy

    A tea connoisseur who firmly believes that life is too short for dull content....

    Read more..
Topics
apt (22) BYOD (11) Cyber-attack (36) cyber-attacks (58) cyberattack (16) cyberattacks (13) Cybersecurity (327) cyber security (34) Cyber threat (33) cyber threats (48) data breach (55) data breaches (28) data loss (28) data loss prevention (34) data privacy (13) data protection (28) data security (15) DLP (49) Encryption (16) endpoint security (109) Enterprise security (17) Exploit (14) firewall (11) GDPR (12) hackers (11) malware (76) malware attack (23) malware attacks (12) MDM (26) Microsoft (15) Network security (23) Patch Management (12) phishing (27) Ransomware (67) ransomware attack (30) ransomware attacks (30) ransomware protection (14) security (12) Seqrite (35) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (17) windows (11)
Loading
Resources
  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies
About Us
  • About Seqrite
  • Leadership
  • Awards & Certifications
  • Newsroom
Archives
  • By Date
  • By Category
Loading

© 2025 Quick Heal Technologies Ltd. Cookie Policies Privacy Policies