• News
  • Security
  • Products
  • About Seqrite
Blogs on Information Technology, Network & Cybersecurity | Seqrite Blog
  • News
  • Security
  • Products
  • About Seqrite

News Archive

Advisory on Russia-Ukraine Conflict-Related Cyberattacks

Advisory on Russia-Ukraine Conflict-Related Cyberattacks

Estimated reading time: 2 minutes

We all are aware of the ongoing conflict between Russia and Ukraine. As the physical war takes place on the ground, it also gives rise to cyberattacks against Russia and Ukraine. We are seeing an increase in malicious cyber...
Read More
March 15, 2022

Seqrite EPS accredited with “Advanced Approved Endpoint Protection” for protection against complex ransomware attacks

Seqrite EPS accredited with “Advanced Approved Endpoint Protection” for protection against complex ransomware attacks

Estimated reading time: 2 minutes

Enterprises are no longer safe from dangerous and expensive ransomware attacks in modern times. It can enter an organization through multiple vectors, such as email spam, phishing attacks, or malicious web downloads. For the highest level of protection, organizations...
Read More
January 3, 2022

Cybersecurity roundup – Jan to April ‘19

Cybersecurity roundup – Jan to April ‘19

Estimated reading time: 2 minutes

2019 is not even halfway over and there is already a flurry of cyber attacks all over the globe. Network administrators and cybersecurity experts have to always be on their toes as, no one is safe from the risk...
Read More
May 22, 2019

Cybersecurity Predictions for 2019

Cybersecurity Predictions for 2019

Estimated reading time: 3 minutes

Another year is here. 2019 has just started and it is likely to shape up to be an eventful year for cybersecurity. Last year, in our 2018 predictions, we analyzed the year ahead and shortlisted various cybersecurity trends which...
Read More
February 22, 2019
  • 10
    Shares

How are social networking accounts used for malicious purposes?

How are social networking accounts used for malicious purposes?

Estimated reading time: 3 minutes

Close to 3 billion. No, that’s not the population of a country. According to a recent estimate, that will be the total number of users globally on social media. The popularity of this phenomenon called social media can aptly...
Read More
February 18, 2019
  • 8
    Shares

Biometric authentication data at risk

Biometric authentication data at risk

Estimated reading time: 3 minutes

You walk up to your car and the door opens on its own. You don’t need to turn the ignition – the car has already recognized you. You stop at a shop and pick out some breakfast. For payment,...
Read More
February 12, 2019
  • 14
    Shares

How to be a smart voter and not become a target of political campaigns on digital platforms

How to be a smart voter and not become a target of political campaigns on digital platforms

Estimated reading time: 3 minutes

The cornerstone of a democracy is voting. For any successful democracy to function properly, it is important to ensure that its people’s representatives are chosen fairly and justly. The obvious take-away then is that if voting as an exercise...
Read More
February 11, 2019
  • 29
    Shares

Can EVMs get hacked? We tell you the truth

Can EVMs get hacked? We tell you the truth

Estimated reading time: 3 minutes

It is the season of elections. The New Year of 2019 will see elections in countries from as varied as Nigeria to Israel to the European Union. But closer home, the Indian General Elections which will be held in...
Read More
February 4, 2019
  • 420
    Shares

What are intra-state cyber threats and how to handle them?

What are intra-state cyber threats and how to handle them?

Estimated reading time: 3 minutes

In the new information age we live in, cyber threats represent an ever-growing and dangerous form of intimidation and pressure. These threats represent a new tool of warfare and seek to reap chaos and distrust. While much attention is...
Read More
January 28, 2019
  • 8K
    Shares

Everything you need to know about RBI’s Circular on Basic Security Framework for Primary UCBs

Everything you need to know about RBI’s Circular on Basic Security Framework for Primary UCBs

Estimated reading time: 4 minutes

The recent spate of cyber-attacks on banks in India has left everyone worried. For those who haven’t kept count, Pune-based Cosmos Bank recently saw a massive security breach where Rs 94 crore was siphoned off. In a similar incident,...
Read More
November 12, 2018
  • 27
    Shares
1 2 … 4 Next →
Popular Posts
  • Benefits of having Intrusion Prevention/Detection System in your enterprise Benefits of having Intrusion Prevention/Detection System in your enterprise February 15, 2018
  • Artificial Intelligence – its use and misuse Artificial Intelligence – its use and misuse February 4, 2019
  • 5 Security measures you should take to protect your organization’s network 5 Security measures you should take to protect your organization’s network August 11, 2017
Featured Authors
  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director and Chief Technology Officer of...

    Read more..
  • Jayesh Kulkarni
    Jayesh Kulkarni

    Jayesh is working as a Security Researcher for a couple of years. He likes to...

    Read more..
Stay Updated!
Topics
apt (11) Cyber-attack (32) cyber-attacks (56) cyberattack (11) cyberattacks (12) Cybersecurity (301) cyber security (26) Cyber threat (29) cyber threats (44) Data (11) data breach (50) data breaches (27) data loss (28) data loss prevention (33) data protection (21) data security (13) DLP (49) Encryption (16) endpoint security (103) Enterprise security (15) EPS (10) Exploit (12) firewall (11) hackers (11) IoT (10) malware (64) malware attack (23) malware attacks (12) MDM (25) Microsoft (14) Network security (18) Patch Management (12) phishing (18) Ransomware (60) ransomware attack (29) ransomware attacks (30) ransomware protection (12) security (10) Seqrite (26) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (15) windows (11)
Products
  • Seqrite MSSP Portal
  • HawkkScan
  • HawkkProtect
  • HawkkHunt XDR
  • HawkkEye
  • HawkkEye Endpoint Security Cloud
  • HawkkEye mSuite
  • HawkkEye Workspace
  • Endpoint Security (EPS)
  • Unified Threat Management
  • Antivirus for Server
  • Antivirus for Linux
Resources
  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies
About Us
  • Company Overview
  • Leadership
  • Why choose SEQRITE?
  • Awards & Certifications
  • Newsroom
Archives
  • By Date
  • By Category

© 2022 Quick Heal Technologies Ltd. Cookie Policies Privacy Policies

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website.
By browsing this website, you agree to our cookie policy.