• News
  • Security
  • Products
  • About Seqrite
Blogs on Information Technology, Network & Cybersecurity | Seqrite Blog
  • News
  • Security
  • Products
  • About Seqrite

Cybersecurity Archive

ZTNA Use Cases and Benefits for BFSI

ZTNA Use Cases and Benefits for BFSI

Estimated reading time: 3 minutes

In an era of digital banking, cloud migration, and a growing cyber threat landscape, traditional perimeter-based security models are no longer sufficient for the Banking, Financial Services, and Insurance (BFSI) sector. Enter Zero Trust Network Access (ZTNA) — a...
Read Blog
May 19, 2025

Market Guide for Choosing the Right ZTNA Solution

Market Guide for Choosing the Right ZTNA Solution

Estimated reading time: 3 minutes

As organizations continue to embrace hybrid work models and migrate applications to the cloud, traditional network security approaches like VPNs are proving inadequate. Zero-trust network Access (ZTNA) has emerged as the modern framework for secure access, operating on the...
Read Blog
May 14, 2025

Protect What Matters Most with Data Discovery and Classification

Protect What Matters Most with Data Discovery and Classification

Estimated reading time: 3 minutes

In today’s high-stakes digital arena, data is the lifeblood of every enterprise. From driving strategy to unlocking customer insights, enterprises depend on data like never before. But with significant volume comes great vulnerability. Imagine managing a massive warehouse without...
Read Blog
May 12, 2025

GDPR vs. DPDP: A Guide for Businesses Navigating Global Data Privacy

GDPR vs. DPDP: A Guide for Businesses Navigating Global Data Privacy

Estimated reading time: 4 minutes

Organizations manage personal data across multiple jurisdictions in today’s interconnected digital economy, requiring a clear understanding of global data protection frameworks. The European Union’s General Data Protection Regulation (GDPR) and India’s Digital Personal Data Protection Act (DPDP) 2023 are...
Read Blog
May 7, 2025

Threat Actors are Targeting US Tax-Session with new Tactics of Stealerium-infostealer

Threat Actors are Targeting US Tax-Session with new Tactics of Stealerium-infostealer

Estimated reading time: 8 minutes

Introduction A security researcher from Seqrite Labs has uncovered a malicious campaign targeting U.S. citizens as Tax Day approaches on April 15. Seqrite Labs has identified multiple phishing attacks leveraging tax-related themes as a vector for social engineering, aiming...
Read Blog
April 30, 2025

Advisory: Pahalgam Attack themed decoys used by APT36 to target the Indian Government

Advisory: Pahalgam Attack themed decoys used by APT36 to target the Indian Government

Estimated reading time: 6 minutes

Seqrite Labs APT team has discovered “Pahalgam Terror Attack” themed documents being used by the Pakistan-linked APT group Transparent Tribe (APT36) to target Indian Government and Defense personnel. The campaign involves both credential phishing and deployment of malicious payloads,...
Read Blog
April 30, 2025

The DPDP Act 2023 Guide for Healthcare Leaders

The DPDP Act 2023 Guide for Healthcare Leaders

Estimated reading time: 3 minutes

The digital transformation of India’s healthcare sector has revolutionized patient care, diagnostics, and operational efficiency. However, this growing reliance on digital platforms has also led to an exponential increase in the collection and processing of sensitive personal data. The...
Read Blog
April 25, 2025

Digital Arrest Scam in India: How Cyber Criminals Exploit Fear to Deceive Victims

Digital Arrest Scam in India:  How Cyber Criminals Exploit Fear to Deceive Victims

Estimated reading time: 3 minutes

Cyber criminals in India are constantly evolving their tactics to exploit fear and trust. One alarming trend is the “Digital Arrest Scam,” where fraudsters impersonate law enforcement agencies or government officials to extort money or sensitive information. These scams...
Read Blog
February 28, 2025

The ROI of Implementing a ZTNA solution

The ROI of Implementing a ZTNA solution

Estimated reading time: 3 minutes

In today’s digital landscape, where cyber threats are evolving rapidly, organizations must rethink their approach to network security. Traditional security models, such as VPNs and perimeter-based defenses, are no longer sufficient to protect against sophisticated cyberattacks. This is where...
Read Blog
February 24, 2025

Formbook Phishing Campaign with old Payloads

Formbook Phishing Campaign with old Payloads

Estimated reading time: 8 minutes

Recently, Seqrite Lab saw a phishing campaign delivering formbook stealers through email attachments. Formbook, as seen since 2016, has evolved in many ways from stealth features to evasion techniques. Being sold on hacking forums as Malware as a Service,...
Read Blog
January 7, 2025
1 2 … 32 Next →
Featured Authors
  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director of Quick Heal Technologies...

    Read more..
  • Mahua Chakrabarthy
    Mahua Chakrabarthy

    A tea connoisseur who firmly believes that life is too short for dull content....

    Read more..
Topics
apt (19) Cyber-attack (35) cyber-attacks (58) cyberattack (16) cyberattacks (13) Cybersecurity (322) cyber security (31) Cyber threat (33) cyber threats (48) Data (11) data breach (55) data breaches (28) data loss (28) data loss prevention (34) data privacy (11) data protection (24) data security (15) DLP (49) Encryption (16) endpoint security (107) Enterprise security (17) Exploit (14) firewall (11) GDPR (12) hackers (11) malware (76) malware attack (23) malware attacks (12) MDM (25) Microsoft (15) Network security (22) Patch Management (12) phishing (27) Ransomware (67) ransomware attack (30) ransomware attacks (30) ransomware protection (13) security (11) Seqrite (33) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (16) windows (11)
Loading
Resources
  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies
About Us
  • About Seqrite
  • Leadership
  • Awards & Certifications
  • Newsroom
Archives
  • By Date
  • By Category
Loading

© 2025 Quick Heal Technologies Ltd. Cookie Policies Privacy Policies