• News
  • Security
  • Products
  • About Seqrite
Blogs on Information Technology, Network & Cybersecurity | Seqrite Blog
  • News
  • Security
  • Products
  • About Seqrite

Cybersecurity Archive

Seqrite launches Encryption solution for optimal security of business data

Seqrite launches Encryption solution for optimal security of business data

Estimated reading time: 2 minutes

Seqrite encryption solution protects corporate data residing on endpoints with a strong encryption algorithms such as AES, RC6, SERPENT and TWOFISH. Full disk encryption supports Microsoft Windows Desktops and Laptops and prevents data loss occurring from loss/theft of endpoint....
Read Blog
November 6, 2017
125
Shares

Cybersecurity News Rundown October 2017

Cybersecurity News Rundown October 2017

Estimated reading time: 2 minutes

Welcome to our Cybersecurity News Rundown for the month of October 2017. Here, we will be sharing latest and trending news on events and technological updates from the world of cybersecurity that happened over the past month. Make sure...
Read Blog
October 31, 2017

Answers to Your Top Cybersecurity Questions

Answers to Your Top Cybersecurity Questions

Estimated reading time: 3 minutes

Introduction Cybersecurity threats are incessantly eating into the organizational data reserves, and it is important that CISOs and IT Security Pros keep a close check on the proliferation of hackers and cyber-criminals. While the overall awareness towards cybersecurity is...
Read Blog
October 27, 2017

Another Ransomware Outbreak! This time it’s Bad Rabbit

Another Ransomware Outbreak! This time it’s Bad Rabbit

Estimated reading time: 3 minutes

The recent Bad Rabbit ransomware outbreak is currently making headlines. This post outlines the analysis of the ransomware by Quick Heal Security Labs. According to our telemetry, we have not seen any Bad Rabbit ransomware infection on our customer’s...
Read Blog
October 25, 2017

What is a Business Email Compromise (BEC) attack? How Seqrite can help in protecting your business email?

What is a Business Email Compromise (BEC) attack? How Seqrite can help in protecting your business email?

Estimated reading time: 3 minutes

A few months back, FBI released a report stating that Business Email Compromise or rather BEC scams usually cost businesses around  $3.1 billion. In addition to that, FBI also warned organizations regarding “Man-in-the-Email” and “CEO Fraud”; some of the...
Read Blog
October 19, 2017

A recent .NET Framework zero day Vulnerability (CVE-2017-8759) is dropping Infostealer malware- An analysis by Quick Heal Security Labs

A recent .NET Framework zero day Vulnerability (CVE-2017-8759) is dropping Infostealer malware- An analysis by Quick Heal Security Labs

Estimated reading time: 4 minutes

.NET Framework Remote Code Execution Vulnerability (CVE-2017-8759) is a code injection vulnerability in the SOAP WSDL parser of .net framework. This vulnerability was a zero-day when it was spotted in the wild. Quick Heal Security Labs had released advisory in the month of...
Read Blog
October 16, 2017

Hacking requires exceptional skills: How can IT security pros stay ahead of the hackers?

Hacking requires exceptional skills: How can IT security pros stay ahead of the hackers?

Estimated reading time: 3 minutes

While security professionals keep developing better software programs, hackers simultaneously devise strategies for combating the upgraded defense. Therefore, in order to analyze the importance of cybersecurity while staying one step ahead of these hackers, the security professionals need to...
Read Blog
October 16, 2017

Central Bank of Kenya mandates robust cybersecurity across banks in Kenya by 30th Nov, 2017

Central Bank of Kenya mandates robust cybersecurity across banks in Kenya by 30th Nov, 2017

Estimated reading time: 5 minutes

The Central Bank of Kenya (CBK) recently issued a guideline to all commercials banks across Kenya to fortify their cybersecurity and establish effective cybersecurity governance and risk management. The CBK acknowledged the growing risk of cyber threats and highlighted...
Read Blog
October 11, 2017

How fraudulent SSL certificates could be utilized to hack your website?

How fraudulent SSL certificates could be utilized to hack your website?

Estimated reading time: 3 minutes

When it comes to validating the identity of any public key infrastructure, digital certificates hold all the aces. A digital certificate is more of an electronic snippet that lends legitimacy to a web service or portal— associating the same...
Read Blog
October 11, 2017

Strengthen your Enterprise Security with Seqrite EPS

Strengthen your Enterprise Security with Seqrite EPS

Estimated reading time: 3 minutes

With the increase in mobility of users, their usage and the access to the organization’s information assets extending to off-campus locations, the security perimeter keeps continuously changing.  This has led to a situation that a simple security solution within...
Read Blog
October 6, 2017
← Previous 1 … 28 29 30 … 33 Next →
Featured Authors
  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director of Quick Heal Technologies...

    Read more..
  • Mahua Chakrabarthy
    Mahua Chakrabarthy

    A tea connoisseur who firmly believes that life is too short for dull content....

    Read more..
Topics
apt (20) Cyber-attack (36) cyber-attacks (58) cyberattack (16) cyberattacks (13) Cybersecurity (324) cyber security (33) Cyber threat (33) cyber threats (48) Data (11) data breach (55) data breaches (28) data loss (28) data loss prevention (34) data privacy (12) data protection (25) data security (15) DLP (49) Encryption (16) endpoint security (108) Enterprise security (17) Exploit (14) firewall (11) GDPR (12) hackers (11) malware (76) malware attack (23) malware attacks (12) MDM (25) Microsoft (15) Network security (22) Patch Management (12) phishing (27) Ransomware (67) ransomware attack (30) ransomware attacks (30) ransomware protection (14) security (11) Seqrite (33) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (17) windows (11)
Loading
Resources
  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies
About Us
  • About Seqrite
  • Leadership
  • Awards & Certifications
  • Newsroom
Archives
  • By Date
  • By Category
Loading

© 2025 Quick Heal Technologies Ltd. Cookie Policies Privacy Policies