• News
  • Security
  • Products
  • About Seqrite
Blogs on Information Technology, Network & Cybersecurity | Seqrite Blog
  • News
  • Security
  • Products
  • About Seqrite

Cybersecurity Archive

Gorgon APT targeting MSME sector in India

Gorgon APT targeting MSME sector in India

Estimated reading time: 5 minutes

From the past few months, we have been monitoring cyber-threats on MSME [Micro, Small and Medium Enterprises] sector within India. MSME sector is considered to be the backbone of the Indian economy. MSME employs around 40% of the country’s...
Read Blog
August 10, 2020

Blue Mockingbird’ threat group targets servers in India for Cryptomining

Blue Mockingbird’ threat group targets servers in India for Cryptomining

Estimated reading time: 6 minutes

Since last year, cyber-criminal groups are spreading cryptomining malware at an alarming rate. Vulnerabilities are being exploited on public-facing servers to run multi-component malware delivering cryptocurrency miners. Mostly servers are being targeted as these machines have a high configuration...
Read Blog
July 27, 2020

Snake Ransomware brings impending doom to enterprise networks

Snake Ransomware brings impending doom to enterprise networks

Estimated reading time: 4 minutes

New targeted ransomware called SNAKE or EKANS was found in early January. Malware is written in the Go language and it is heavily obfuscated and goes after ICS environments. Snake Ransomware seems to be distributed via a focused and...
Read Blog
July 10, 2020

Operation ‘Honey Trap’: APT36 Targets Defence Organizations in India

Operation ‘Honey Trap’: APT36 Targets Defence Organizations in India

Estimated reading time: 3 minutes

Summary In the last 3 months, we have noticed increased activity from APT36, a Pakistan-linked Cyber Threat actor. The target this time are personnel belonging to defence organizations & other Government organizations in India. In the recent wave of...
Read Blog
July 8, 2020

Is the education sector turning a blind eye to cyberthreats emerging from a remote working model?

Is the education sector turning a blind eye to cyberthreats emerging from a remote working model?

Estimated reading time: 2 minutes

In recent times, the education sector has seen an upsurge in the number of cyberthreats. Seqrite’s Threat Report Q3 2019 found that the education sector saw the largest number of cyberthreats between July and September 2019, accounting for 30%...
Read Blog
June 30, 2020

Enterprises using Microsoft’s collaboration tools under attack?

Enterprises using Microsoft’s collaboration tools under attack?

Estimated reading time: 2 minutes

Enterprise collaboration tools have seen an upsurge in popularity this year, thanks to the global pandemic forcing organizations all over the world to work from home. Even as the economy takes the initial step towards resumption, the days of...
Read Blog
June 24, 2020

Maze ransomware continues to induce maximum mayhem for the enterprise

Maze ransomware continues to induce maximum mayhem for the enterprise

Estimated reading time: 6 minutes

Maze is a recently highlighted ransomware among the ever-growing list of ransomware families. The ransomware is active from the past one year, although it came into limelight due to its new approach of publishing sensitive data of infected customers...
Read Blog
June 18, 2020

What are the attack channels used by adversaries to target the manufacturing sector during the Coronavirus pandemic?

What are the attack channels used by adversaries to target the manufacturing sector during the Coronavirus pandemic?

Estimated reading time: 2 minutes

The onset of the coronavirus (COVID-19) pandemic and the resultant social distancing measures across the world has had a sobering effect on the manufacturing industry. Large-scale plants have shuttered down and with demand at a historical low, the economic...
Read Blog
June 11, 2020

When will IT & ITes businesses understand the data breach dangers from a work from home staff?

When will IT & ITes businesses understand the data breach dangers from a work from home staff?

Estimated reading time: 2 minutes

The unprecedented rise of a work from home staff has greatly increased the risk of data breaches for the IT/ITes sector. With companies forced to mandate Work From Home (WFH) for its employees in the face of the global...
Read Blog
June 9, 2020

Can businesses be attacked due to unsecured domain names?

Can businesses be attacked due to unsecured domain names?

Estimated reading time: 2 minutes

A domain name is a business’s primary identity on the internet —current and potential customers identify a business through its domain name. Social media has provided a new channel to connect with customers but a domain name remains an...
Read Blog
May 20, 2020
← Previous 1 … 8 9 10 … 32 Next →
Featured Authors
  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director of Quick Heal Technologies...

    Read more..
  • Mahua Chakrabarthy
    Mahua Chakrabarthy

    A tea connoisseur who firmly believes that life is too short for dull content....

    Read more..
Topics
apt (19) Cyber-attack (35) cyber-attacks (58) cyberattack (16) cyberattacks (13) Cybersecurity (322) cyber security (31) Cyber threat (33) cyber threats (48) Data (11) data breach (55) data breaches (28) data loss (28) data loss prevention (34) data privacy (11) data protection (24) data security (15) DLP (49) Encryption (16) endpoint security (107) Enterprise security (17) Exploit (14) firewall (11) GDPR (12) hackers (11) malware (76) malware attack (23) malware attacks (12) MDM (25) Microsoft (15) Network security (22) Patch Management (12) phishing (27) Ransomware (67) ransomware attack (30) ransomware attacks (30) ransomware protection (13) security (11) Seqrite (33) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (16) windows (11)
Loading
Resources
  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies
About Us
  • About Seqrite
  • Leadership
  • Awards & Certifications
  • Newsroom
Archives
  • By Date
  • By Category
Loading

© 2025 Quick Heal Technologies Ltd. Cookie Policies Privacy Policies