• News
  • Security
  • Products
  • About Seqrite
Blogs on Information Technology, Network & Cybersecurity | Seqrite Blog
  • News
  • Security
  • Products
  • About Seqrite

Cybersecurity Archive

Turn the Page: Cybersecurity Predictions for 2021 & beyond

Turn the Page: Cybersecurity Predictions for 2021 & beyond

Estimated reading time: 2 minutes

Making accurate predictions, especially for cybersecurity needs years of experience — 2020 was a different situation altogether. Amidst many forecasts, no one predicted the onslaught of a global pandemic that would disrupt the world as we know it, baffling...
Read Blog
February 18, 2021

Pharma Sector needs to streamline its insides to avoid cyberattacks

Pharma Sector needs to streamline its insides to avoid cyberattacks

Estimated reading time: 2 minutes

2020 has been a year when pharma companies have been in the spotlight. The unprecedented COVID-19 pandemic, while shuttering offices and impacting lives across the globe, led to an immediate upsurge in interest for a potential vaccine. With much...
Read Blog
February 12, 2021

How can EdTech companies deal with rising security challenges?

How can EdTech companies deal with rising security challenges?

Estimated reading time: 2 minutes

Institutes and organizations across the world are using EdTech to complement their offerings further. However, it is also important to understand that the rapidly rising EdTech industry is also vulnerable to certain security challenges which can prove damaging. A...
Read Blog
December 24, 2020

RAT used by Chinese cyberspies infiltrating Indian businesses

RAT used by Chinese cyberspies infiltrating Indian businesses

Estimated reading time: 4 minutes

A few months back, Delphibased malware was being distributed on multiple systems via SMB exploit. The payloads used by this malware have close similarities with open-source Gh0stRAT code. Gh0st has been used by Chinese threat actors to target multiple...
Read Blog
December 18, 2020

Are air-gapped networks completely secure?

Are air-gapped networks completely secure?

Estimated reading time: 2 minutes

An air-gapped network (or system) is isolated from all other networks. This essentially means that the system or the network is physically not connected to any outside network, whether it is the internet or a local area network. The...
Read Blog
December 17, 2020

Cybersecurity in the holiday season: minimizing the risk of cyberattacks

Cybersecurity in the holiday season: minimizing the risk of cyberattacks

Estimated reading time: 2 minutes

The holiday season is upon us. While employees take time off to be with their families and enjoy some well-deserved rest and recognition, cybersecurity cannot afford to take it easy. It’s a clear fact that the holiday season is...
Read Blog
December 11, 2020

Is accelerating enterprise digital transformation leading to cyberthreats?

Is accelerating enterprise digital transformation leading to cyberthreats?

Estimated reading time: 3 minutes

Without a doubt, 2020 will go down in history as a year which changed the course of humanity. While the jury is still out on whether this change has been good or bad, it cannot be denied that the...
Read Blog
November 25, 2020

Thanos Ransomware Evading Anti-ransomware Protection With RIPlace Tactic

Thanos Ransomware Evading Anti-ransomware Protection With RIPlace Tactic

Estimated reading time: 5 minutes

Ransomware has come a long way in cyberspace by continuous improvement in its techniques and tactics in encrypting system files. Over the years ransomware has improvised itself by moving from PE to non-PE and standalone payloads, by using different...
Read Blog
November 18, 2020

Could rising unemployment lead to an increase in cybercrimes?

Could rising unemployment lead to an increase in cybercrimes?

Estimated reading time: 2 minutes

  A few numbers provide a sobering perspective of the massive global economic impact the ongoing COVID-19 pandemic has had. Early on, when the pandemic had just started, the International Labour Organization (ILO), a division of the United Nations,...
Read Blog
November 6, 2020

Could geopolitical tensions lead to large-scale cyberattacks?

Could geopolitical tensions lead to large-scale cyberattacks?

Estimated reading time: 2 minutes

The prospect of geopolitical tensions leading to large-scale cyberattacks is a very real one. Nor would it be a new development – nation-states have been using cyberattacks as a warfare technique for more than a decade now. Perhaps the...
Read Blog
October 23, 2020
← Previous 1 2 3 4 … 16 Next →
Featured Authors
  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director of Quick Heal Technologies...

    Read more..
  • Mahua Chakrabarthy
    Mahua Chakrabarthy

    A tea connoisseur who firmly believes that life is too short for dull content....

    Read more..
Topics
apt (22) BYOD (11) Cyber-attack (36) cyber-attacks (58) cyberattack (16) cyberattacks (13) Cybersecurity (327) cyber security (34) Cyber threat (33) cyber threats (48) data breach (55) data breaches (28) data loss (28) data loss prevention (34) data privacy (13) data protection (28) data security (15) DLP (49) Encryption (16) endpoint security (109) Enterprise security (17) Exploit (14) firewall (11) GDPR (12) hackers (11) malware (76) malware attack (23) malware attacks (12) MDM (26) Microsoft (15) Network security (23) Patch Management (12) phishing (27) Ransomware (67) ransomware attack (30) ransomware attacks (30) ransomware protection (14) security (12) Seqrite (35) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (17) windows (11)
Loading
Resources
  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies
About Us
  • About Seqrite
  • Leadership
  • Awards & Certifications
  • Newsroom
Archives
  • By Date
  • By Category
Loading

© 2025 Quick Heal Technologies Ltd. Cookie Policies Privacy Policies