• News
  • Security
  • Products
  • About Seqrite
Blogs on Information Technology, Network & Cybersecurity | Seqrite Blog
  • News
  • Security
  • Products
  • About Seqrite

Cybersecurity Archive

Cybersecurity for the hospitality sector: What you need to know

Cybersecurity for the hospitality sector: What you need to know

Estimated reading time: 3 minutes

Marriott International. Hilton. Four Seasons. Trump Hotels. InterContinental. Hard Rock Hotel. These are some of the biggest hospitality chains in the business. But there’s another detail also that connects the above names: In the last couple of years, all...
Read Blog
March 13, 2019
13
Shares

The need for international agreements on cybersecurity

The need for international agreements on cybersecurity

Estimated reading time: 3 minutes

Over the last decade or so, it has become increasingly obvious that cybersecurity is no longer just a local issue. As the world has leaped into a digital era with communication in the blink of an eye and the...
Read Blog
March 11, 2019
4
Shares

Warning Signs that Your Computer is infected with malware – Part II

Warning Signs that Your Computer is infected with malware – Part II

Estimated reading time: 3 minutes

In our first part of this series, we provided a few scenarios of your system not working the way it should and how it could be a symptom of a malware infection. Unfortunately, if you thought those were the...
Read Blog
March 1, 2019
12
Shares

Warning Signs that Your Computer is infected with malware – Part I

Warning Signs that Your Computer is infected with malware – Part I

Estimated reading time: 3 minutes

A malware infection can lead to a major drop in productivity. Whether it’s on an office system or on a personal one, these infections can lead to everyday work grinding down to a halt and at worse, a complete...
Read Blog
February 27, 2019
2
Shares

Most common cybersecurity threats that occur in the healthcare sector

Most common cybersecurity threats that occur in the healthcare sector

Estimated reading time: 3 minutes

While almost all industries and sectors are at the risk of cyber threats, the effects on these threats on certain sectors can be disastrous. One of these sectors is healthcare. A cyber attack on a healthcare system can be...
Read Blog
February 25, 2019
14
Shares

MaaS Moving Towards APT as a Service?

MaaS Moving Towards APT as a Service?

Estimated reading time: 3 minutes

We have all heard about the dark web. It’s that mysterious part of the Internet which can’t be accessed normally, which is not indexed on a search engine and contains all the illegal activities that are taking place. Whether...
Read Blog
February 5, 2019
9
Shares

Artificial Intelligence – its use and misuse

Artificial Intelligence – its use and misuse

Estimated reading time: 3 minutes

The term “artificial intelligence” always conjures images of a science-fiction prototype. Thanks to the influence of popular culture, artificial intelligence is always interpreted in the popular culture as intelligent machines and robots, autonomous, independent and able to take their...
Read Blog
February 4, 2019
17
Shares

This is how hackers can invade your system without installing malware

This is how hackers can invade your system without installing malware

Estimated reading time: 3 minutes

Even those with a passive interest in cybersecurity have a fair idea of how hackers can take control of a system. This is mostly done through malware – unsuspecting users somehow download or access a malicious file or a...
Read Blog
February 1, 2019
13
Shares

GandCrab Ransomware along with Monero Miner and Spammer

GandCrab Ransomware along with Monero Miner and Spammer

Estimated reading time: 5 minutes

Recently we saw a new campaign through spam mail attachment- zip file. It contains JavaScript file which delivers a bundle of GandCrab Ransomware, Monero miner and Spammer. This bundle of multiple malware variants is nothing new, it is common...
Read Blog
January 24, 2019

Applying Deep Learning for PE-Malware Classification

Applying Deep Learning for PE-Malware Classification

Estimated reading time: 6 minutes

Deep Learning & Computer vision techniques are making progress in every possible field. With growing computing powers many organizations use them to resolve or minimize many day-to-day problems. In a recent talk at AVAR 2018, Quick Heal AI team...
Read Blog
January 10, 2019
15
Shares
← Previous 1 … 13 14 15 … 32 Next →
Featured Authors
  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director of Quick Heal Technologies...

    Read more..
  • Mahua Chakrabarthy
    Mahua Chakrabarthy

    A tea connoisseur who firmly believes that life is too short for dull content....

    Read more..
Topics
apt (19) Cyber-attack (35) cyber-attacks (58) cyberattack (16) cyberattacks (13) Cybersecurity (319) cyber security (30) Cyber threat (33) cyber threats (48) Data (11) data breach (55) data breaches (28) data loss (28) data loss prevention (34) data protection (24) data security (15) DLP (49) Encryption (16) endpoint security (106) Enterprise security (17) Exploit (14) firewall (11) GDPR (12) hackers (11) IoT (10) malware (76) malware attack (23) malware attacks (12) MDM (25) Microsoft (15) Network security (22) Patch Management (12) phishing (27) Ransomware (67) ransomware attack (30) ransomware attacks (30) ransomware protection (13) security (11) Seqrite (33) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (16) windows (11)
Loading
Resources
  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies
About Us
  • About Seqrite
  • Leadership
  • Awards & Certifications
  • Newsroom
Archives
  • By Date
  • By Category
Loading

© 2025 Quick Heal Technologies Ltd. Cookie Policies Privacy Policies