• News
  • Security
  • Products
  • About Seqrite
Blogs on Information Technology, Network & Cybersecurity | Seqrite Blog
  • News
  • Security
  • Products
  • About Seqrite

Cybersecurity Archive

Malspam Campaign using CVE-2017-0199 Targets Manufacturing, Pharmaceutical and other important Industries

Malspam Campaign using CVE-2017-0199 Targets Manufacturing, Pharmaceutical and other important Industries

Estimated reading time: 4 minutes

Quick Heal Security Labs has come across various email campaigns that are actively exploiting the famous vulnerability CVE-2017-0199 in their bid to target prominent private industries in India. CVE-2017-0199 was a zero-day vulnerability reported in April 2017 by two...
Read Blog
August 30, 2017

Top industries at risk of cyber attacks in 2017

Top industries at risk of cyber attacks in 2017

Estimated reading time: 3 minutes

Businesses today carry more sensitive data than ever before. Any crucial information about the customers, if it gets into the wrong hands, can cause a lot of damage to both clients as well as companies. Apart from the client’s information,...
Read Blog
August 10, 2017

An analysis of the fileless malware by Quick Heal Security Labs

An analysis of the fileless malware by Quick Heal Security Labs

Estimated reading time: 4 minutes

The fileless malware is a malware family that does not leave any trace of its infection in the affected file system. Also known as the ‘memory resident virus’, this type of malware hides in the registry and memory making...
Read Blog
August 9, 2017

An analysis of the Blank Slate Malspam Campaign by Quick Heal Security Labs

An analysis of the Blank Slate Malspam Campaign by Quick Heal Security Labs

Estimated reading time: 4 minutes

Malspam email or malicious spam email is considered as one of the favorite malware delivery channels for attackers to deliver their malware to their targeted victims. Attackers also run spam email campaigns to distribute their malware to a large...
Read Blog
August 4, 2017

NemucodAES malspam is back and this time it brought along Kovter Trojan

NemucodAES malspam is back and this time it brought along Kovter Trojan

Estimated reading time: 3 minutes

For the last few weeks, we have been observing a new malicious spam (malspam) variant that is spreading via an email claiming to be from the United Parcel Service (UPS) carriages. The email carries a zip attachment that contains...
Read Blog
July 21, 2017

Security measures to be taken by FinTech startups to avoid cyber attacks

Security measures to be taken by FinTech startups to avoid cyber attacks

Estimated reading time: 4 minutes

The financial sector is one of the favorite targets of cyber criminals. The examples of a security breach in the financial world are available a dime a dozen. The latest one was the 81 million USD online robbery at...
Read Blog
July 20, 2017

Cybersecurity challenges: How do retailers protect their business?

Cybersecurity challenges: How do retailers protect their business?

Estimated reading time: 4 minutes

For retailers, the online market has seen tremendous growth over the last few years, to the extent that the online business often outstrips the brick-and-mortar store business. While online business is preferred by both, businesses and consumers alike, it...
Read Blog
July 17, 2017

Security Vs. SaaS: Difficulties with SMBs

Security Vs. SaaS: Difficulties with SMBs

Estimated reading time: 2 minutes

The small and medium businesses have been growing at a fast pace in recent times. Their eco-system has become more competitive. Each one is struggling to keep their expenses minimalistic and at the same time derive maximum out of...
Read Blog
July 14, 2017

How Seqrite Endpoint security solution can help you in setting up a secure business?

How Seqrite Endpoint security solution can help you in setting up a secure business?

Estimated reading time: 3 minutes

Enterprises, big or small, across all sectors are facing unprecedented cyber threats. Viruses, malware, DDoS and other kinds of attacks are increasing by the day. Additionally, the regulation for data security and other compliance requirements are also on the...
Read Blog
July 12, 2017

A single infected computer can cost your business millions of dollars, know how to save

A single infected computer can cost your business millions of dollars, know how to save

Estimated reading time: 4 minutes

It was August 5th, 2012, when a massive cyber-attack crippled operations of one of the world’s leading petroleum and natural gas company, Saudi Aramco. A Virus named ‘Shamoon’ wiped out data from 35,000 computers bringing most of their operations...
Read Blog
July 11, 2017
← Previous 1 … 13 14 15 16 Next →
Featured Authors
  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director of Quick Heal Technologies...

    Read more..
  • Mahua Chakrabarthy
    Mahua Chakrabarthy

    A tea connoisseur who firmly believes that life is too short for dull content....

    Read more..
Topics
apt (23) BYOD (11) Cyber-attack (36) cyber-attacks (58) cyberattack (16) cyberattacks (13) Cybersecurity (327) cyber security (34) Cyber threat (33) cyber threats (48) data breach (55) data breaches (28) data loss (28) data loss prevention (34) data privacy (13) data protection (28) data security (15) DLP (49) Encryption (16) endpoint security (109) Enterprise security (17) Exploit (14) firewall (11) GDPR (12) hackers (11) malware (76) malware attack (23) malware attacks (12) MDM (26) Microsoft (15) Network security (23) Patch Management (12) phishing (27) Ransomware (67) ransomware attack (30) ransomware attacks (30) ransomware protection (14) security (12) Seqrite (35) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (17) windows (11)
Loading
Resources
  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies
About Us
  • About Seqrite
  • Leadership
  • Awards & Certifications
  • Newsroom
Archives
  • By Date
  • By Category
Loading

© 2025 Quick Heal Technologies Ltd. Cookie Policies Privacy Policies