• News
  • Security
  • Products
  • About Seqrite
Blogs on Information Technology, Network & Cybersecurity | Seqrite Blog
  • News
  • Security
  • Products
  • About Seqrite

News Archive

The truth about the Twitter cryptocurrency giveaway

The truth about the Twitter cryptocurrency giveaway

Estimated reading time: 3 minutes

Whether you like him or dislike him, one thing you can’t disagree with is that Elon Musk, the man behind Tesla and SpaceX, is a bonafide star. What he says makes news and his every utterance becomes a headline....
Read Blog
November 10, 2018
1
Share

Seqrite Endpoint Security supports the Windows 10 October 2018 Update

Seqrite Endpoint Security supports the Windows 10 October 2018 Update

Estimated reading time: 2 minutes

As part of the Windows 10 Updates, Microsoft has now come up with a new update for Windows 10 PCs. The name is Windows 10 October 2018 Update. This post lists down some of the highlights of Windows 10...
Read Blog
October 4, 2018
18
Shares

Importance of industry certifications for security products and what do they mean

Importance of industry certifications for security products and what do they mean

Estimated reading time: 3 minutes

The importance of cybersecurity has slowly seeped into the consciousness of enterprises. A cybercrime can undo years of work in an instant and enterprises are recognizing this and trying to find ways to stay safe. Hence, investment in security...
Read Blog
August 16, 2018
3
Shares

What India’s data protection law might mean for your business

What India’s data protection law might mean for your business

Estimated reading time: 3 minutes

India has taken a step forward towards laying down a proper policy for data protection. The Srikrishna Committee, a 10-member expert committee headed by former Supreme Court judge BN Srikrishna and appointed by the Indian government in August 2017...
Read Blog
August 6, 2018
305
Shares

New fake resume email campaign infecting users with the SmokeLoader malware

New fake resume email campaign infecting users with the SmokeLoader malware

Estimated reading time: 4 minutes

Email attachments are a favorite medium for attackers to deliver malware. They can be used to target a specific user or multiple users at the same time by launching spam email campaigns. To succeed in carrying out an intended...
Read Blog
January 29, 2018
8
Shares

Cybersecurity News Rundown November 2017

Cybersecurity News Rundown November 2017

Estimated reading time: 3 minutes

Welcome to our Cybersecurity News Rundown for the month of November 2017. Here, we will be sharing latest and trending news on events and technological updates from the world of cybersecurity that happened over the past month. Make sure...
Read Blog
November 30, 2017
1
Share

Cybersecurity News Rundown September 2017

Cybersecurity News Rundown September 2017

Estimated reading time: 3 minutes

Welcome to our Cybersecurity News Rundown for the month of September 2017. Here, we will be sharing latest and trending news on events and technological updates from the world of cybersecurity that happened over the past month. Make sure...
Read Blog
September 30, 2017

Cyber Intelligence averted major Internet service disruption in India

Cyber Intelligence averted major Internet service disruption in India

Estimated reading time: 4 minutes

A breach at IRINN systems could have affected India’s over 6000 ISPs, Government and Private Organisations. We at Seqrite’s Cyber Intelligence Labs (https://seqrite.com) working closely with our Partner, seQtree InfoServices (https://seqtree.com/) recently tracked a broadcast advertisement on a Darknet...
Read Blog
September 29, 2017
7

Cybersecurity News Rundown August 2017

Cybersecurity News Rundown August 2017

Estimated reading time: 2 minutes

Welcome to our Cybersecurity News Rundown for the month of August 2017. Here, we will be sharing latest and trending news on events and technological updates from the world of cybersecurity that happened over the past month. Make sure...
Read Blog
August 31, 2017

Seqrite Endpoint Security (EPS) version 7.2 released: All the key features explained

Seqrite Endpoint Security (EPS) version 7.2 released: All the key features explained

Estimated reading time: 2 minutes

Seqrite has launched Seqrite Endpoint Security (EPS) 7.2, a comprehensive solution securing endpoints and data that encompasses more competitive features with enhanced protection and powerful performance. Seqrite EPS 7.2 incorporates a host of new and improved features that provides SMEs...
Read Blog
May 16, 2017
← Previous 1 2 3 Next →
Featured Authors
  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director of Quick Heal Technologies...

    Read more..
  • Mahua Chakrabarthy
    Mahua Chakrabarthy

    A tea connoisseur who firmly believes that life is too short for dull content....

    Read more..
Topics
apt (23) BYOD (11) Cyber-attack (36) cyber-attacks (58) cyberattack (16) cyberattacks (14) Cybersecurity (328) cyber security (34) Cyber threat (33) cyber threats (48) data breach (56) data breaches (28) data loss (28) data loss prevention (34) data privacy (13) data protection (28) data security (15) DLP (49) Encryption (16) endpoint security (110) Enterprise security (17) Exploit (14) firewall (11) GDPR (13) hackers (11) malware (76) malware attack (23) malware attacks (12) MDM (26) Microsoft (15) Network security (23) Patch Management (12) phishing (28) Ransomware (68) ransomware attack (30) ransomware attacks (30) ransomware protection (14) security (12) Seqrite (36) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (17) windows (11)
Loading
Resources
  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies
About Us
  • About Seqrite
  • Leadership
  • Awards & Certifications
  • Newsroom
Archives
  • By Date
  • By Category
Loading

© 2025 Quick Heal Technologies Ltd. Cookie Policies Privacy Policies