• News
  • Security
  • Products
  • About Seqrite
Blogs on Information Technology, Network & Cybersecurity | Seqrite Blog
  • News
  • Security
  • Products
  • About Seqrite

Cybersecurity Tips Archive

Threat Actors are Targeting US Tax-Session with new Tactics of Stealerium-infostealer

Threat Actors are Targeting US Tax-Session with new Tactics of Stealerium-infostealer

Estimated reading time: 8 minutes

Introduction A security researcher from Seqrite Labs has uncovered a malicious campaign targeting U.S. citizens as Tax Day approaches on April 15. Seqrite Labs has identified multiple phishing attacks leveraging tax-related themes as a vector for social engineering, aiming...
Read Blog
April 30, 2025

Advisory: Pahalgam Attack themed decoys used by APT36 to target the Indian Government

Advisory: Pahalgam Attack themed decoys used by APT36 to target the Indian Government

Estimated reading time: 6 minutes

Seqrite Labs APT team has discovered “Pahalgam Terror Attack” themed documents being used by the Pakistan-linked APT group Transparent Tribe (APT36) to target Indian Government and Defense personnel. The campaign involves both credential phishing and deployment of malicious payloads,...
Read Blog
April 30, 2025

Zero Trust Best Practices for Enterprises and Small Businesses

Zero Trust Best Practices for Enterprises and Small Businesses

Estimated reading time: 3 minutes

Cybersecurity threats are becoming more sophisticated and frequent in today’s digital landscape. Whether a large enterprise or a growing small business, organizations must pivot from traditional perimeter-based security models to a more modern, robust approach—Zero Trust Security. At its...
Read Blog
April 28, 2025

Why choose Seqrite mSuite- we give you 5 reasons!

Why choose Seqrite mSuite- we give you 5 reasons!

Estimated reading time: 2 minutes

Smartphones are no longer luxuries – in today’s day and age, they are an omnipresent reality. Mobile devices do not just offer connectivity anymore, there are used for many business functions. Business emails, document reviews, editing, and video conferencing are...
Read Blog
April 16, 2019

Right to Be Forgotten – When It Applies & When It Doesn’t

Right to Be Forgotten – When It Applies & When It Doesn’t

Estimated reading time: 2 minutes

One of the most complex topics in the European Union’s landmark General Data Protection Regulation (GDPR) is the Right to be Forgotten, also known as the Right to Erasure. On the outset, the concept seems simple – individuals can...
Read Blog
April 9, 2019
8
Shares

Cybersecurity for the hospitality sector: What you need to know

Cybersecurity for the hospitality sector: What you need to know

Estimated reading time: 3 minutes

Marriott International. Hilton. Four Seasons. Trump Hotels. InterContinental. Hard Rock Hotel. These are some of the biggest hospitality chains in the business. But there’s another detail also that connects the above names: In the last couple of years, all...
Read Blog
March 13, 2019
13
Shares

Top 5 IT tips for remote and mobile teams

Top 5 IT tips for remote and mobile teams

Estimated reading time: 3 minutes

Cybersecurity threats are lurking everywhere. In 2015, a vulnerability was detected in WiFi routers in hotel allowing attackers to distribute malware and monitor and record data sent over the network. A laptop is stolen every 53 seconds in the...
Read Blog
August 16, 2018
3
Shares

Are we ready for Amazon’s automated grocery store?

Are we ready for Amazon’s automated grocery store?

Estimated reading time: 3 minutes

Welcome to the future, ladies and gentlemen. On January 22nd, on 2131, 7th Avenue in Seattle, Washington, the world got a taste of what the future could be like. The address saw the opening of the first Amazon Go...
Read Blog
February 27, 2018
17
Shares

How do cyber criminals celebrate Valentine’s day

How do cyber criminals celebrate Valentine’s day

Estimated reading time: 2 minutes

February 14th, Valentine’s Day, maybe the day of love but there’s no love lost between cybercriminals and their target. In recent years, these criminals are only getting smarter in their ways and ensuring that they time their attacks at...
Read Blog
February 13, 2018
201
Shares

Find out how safe you are on the Internet! Take this Quiz.

Find out how safe you are on the Internet! Take this Quiz.

Estimated reading time: < 1 minute

Take our quiz to find out how safe you are on the Internet. [slickquiz id=1]  
Read Blog
February 6, 2018
228
Shares
1
1 2 Next →
Featured Authors
  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director of Quick Heal Technologies...

    Read more..
  • Mahua Chakrabarthy
    Mahua Chakrabarthy

    A tea connoisseur who firmly believes that life is too short for dull content....

    Read more..
Topics
apt (19) Cyber-attack (35) cyber-attacks (58) cyberattack (16) cyberattacks (13) Cybersecurity (322) cyber security (31) Cyber threat (33) cyber threats (48) Data (11) data breach (55) data breaches (28) data loss (28) data loss prevention (34) data privacy (11) data protection (24) data security (15) DLP (49) Encryption (16) endpoint security (107) Enterprise security (17) Exploit (14) firewall (11) GDPR (12) hackers (11) malware (76) malware attack (23) malware attacks (12) MDM (25) Microsoft (15) Network security (22) Patch Management (12) phishing (27) Ransomware (67) ransomware attack (30) ransomware attacks (30) ransomware protection (13) security (11) Seqrite (33) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (16) windows (11)
Loading
Resources
  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies
About Us
  • About Seqrite
  • Leadership
  • Awards & Certifications
  • Newsroom
Archives
  • By Date
  • By Category
Loading

© 2025 Quick Heal Technologies Ltd. Cookie Policies Privacy Policies