• News
  • Security
  • Products
  • About Seqrite
Blogs on Information Technology, Network & Cybersecurity | Seqrite Blog
  • News
  • Security
  • Products
  • About Seqrite

Cybersecurity Archive

Deploy a layered security model through Seqrite!

Deploy a layered security model through Seqrite!

Estimated reading time: 2 minutes

To understand the concept of layered security, it’s important to remember a key tenet of cybersecurity – no security solution is infallible. As security experts state, it’s not a question of how, but when. Cybercrooks are evolving everyday to...
Read Blog
September 17, 2020

Did you know that adversaries are planning to steal your data?

Did you know that adversaries are planning to steal your data?

Estimated reading time: 2 minutes

How valuable is data? A good way to answer that question is to look at the average cost of a data breach. Recent research in May 2020 found that the average cost of a data breach was USD 3.92...
Read Blog
September 11, 2020

Ruthless Valak snowballs into an enterprise’s worst nightmare.

Ruthless Valak snowballs into an enterprise’s worst nightmare.

Estimated reading time: 2 minutes

A new and deadlier version of a familiar malware —it was discovered in 2019 and designated a sophisticated piece of malware, Valak was considered a type of malware loader, a type of program used to load other malware on...
Read Blog
September 9, 2020

All you need to know about Application Programming Interface (API) Security

All you need to know about Application Programming Interface (API) Security

Estimated reading time: 4 minutes

An Application Programming Interface (API) is a way that allows applications to communicate with one another. It provides a way for developers to build software applications while enabling the extraction and sharing of data in an accessible manner. APIs...
Read Blog
August 21, 2020

Gorgon APT targeting MSME sector in India

Gorgon APT targeting MSME sector in India

Estimated reading time: 5 minutes

From the past few months, we have been monitoring cyber-threats on MSME [Micro, Small and Medium Enterprises] sector within India. MSME sector is considered to be the backbone of the Indian economy. MSME employs around 40% of the country’s...
Read Blog
August 10, 2020

Blue Mockingbird’ threat group targets servers in India for Cryptomining

Blue Mockingbird’ threat group targets servers in India for Cryptomining

Estimated reading time: 6 minutes

Since last year, cyber-criminal groups are spreading cryptomining malware at an alarming rate. Vulnerabilities are being exploited on public-facing servers to run multi-component malware delivering cryptocurrency miners. Mostly servers are being targeted as these machines have a high configuration...
Read Blog
July 27, 2020

Snake Ransomware brings impending doom to enterprise networks

Snake Ransomware brings impending doom to enterprise networks

Estimated reading time: 4 minutes

New targeted ransomware called SNAKE or EKANS was found in early January. Malware is written in the Go language and it is heavily obfuscated and goes after ICS environments. Snake Ransomware seems to be distributed via a focused and...
Read Blog
July 10, 2020

Operation ‘Honey Trap’: APT36 Targets Defence Organizations in India

Operation ‘Honey Trap’: APT36 Targets Defence Organizations in India

Estimated reading time: 3 minutes

Summary In the last 3 months, we have noticed increased activity from APT36, a Pakistan-linked Cyber Threat actor. The target this time are personnel belonging to defence organizations & other Government organizations in India. In the recent wave of...
Read Blog
July 8, 2020

Is the education sector turning a blind eye to cyberthreats emerging from a remote working model?

Is the education sector turning a blind eye to cyberthreats emerging from a remote working model?

Estimated reading time: 2 minutes

In recent times, the education sector has seen an upsurge in the number of cyberthreats. Seqrite’s Threat Report Q3 2019 found that the education sector saw the largest number of cyberthreats between July and September 2019, accounting for 30%...
Read Blog
June 30, 2020

Enterprises using Microsoft’s collaboration tools under attack?

Enterprises using Microsoft’s collaboration tools under attack?

Estimated reading time: 2 minutes

Enterprise collaboration tools have seen an upsurge in popularity this year, thanks to the global pandemic forcing organizations all over the world to work from home. Even as the economy takes the initial step towards resumption, the days of...
Read Blog
June 24, 2020
← Previous 1 … 7 8 9 … 32 Next →
Featured Authors
  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director of Quick Heal Technologies...

    Read more..
  • Mahua Chakrabarthy
    Mahua Chakrabarthy

    A tea connoisseur who firmly believes that life is too short for dull content....

    Read more..
Topics
apt (20) Cyber-attack (36) cyber-attacks (58) cyberattack (16) cyberattacks (13) Cybersecurity (324) cyber security (33) Cyber threat (33) cyber threats (48) Data (11) data breach (55) data breaches (28) data loss (28) data loss prevention (34) data privacy (12) data protection (25) data security (15) DLP (49) Encryption (16) endpoint security (108) Enterprise security (17) Exploit (14) firewall (11) GDPR (12) hackers (11) malware (76) malware attack (23) malware attacks (12) MDM (25) Microsoft (15) Network security (22) Patch Management (12) phishing (27) Ransomware (67) ransomware attack (30) ransomware attacks (30) ransomware protection (14) security (11) Seqrite (33) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (17) windows (11)
Loading
Resources
  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies
About Us
  • About Seqrite
  • Leadership
  • Awards & Certifications
  • Newsroom
Archives
  • By Date
  • By Category
Loading

© 2025 Quick Heal Technologies Ltd. Cookie Policies Privacy Policies