• News
  • Security
  • Products
  • About Seqrite
Blogs on Information Technology, Network & Cybersecurity | Seqrite Blog
  • News
  • Security
  • Products
  • About Seqrite

Security Archive

Transparent Tribe Targeting Critical Indian Organizations

Transparent Tribe Targeting Critical Indian Organizations

Estimated reading time: 5 minutes

Quick Heal Labs have been tracking this Cyber-espionage operation since 2016. We have identified this attack as operation m_project. From the past year, we have seen a surge in these APT activities. Modus operandi of the attackers have remained...
Read Blog
May 12, 2020

How safe it is to use the Zoom video-conferencing app?

How safe it is to use the Zoom video-conferencing app?

Estimated reading time: 3 minutes

Recently the Union home ministry has issued a warning raising a red flag for users of Zoom video-conferencing application and marked it as unsafe to use. Earlier, during the end of March, CERT-IN, India’s nodal cybersecurity agency had warned...
Read Blog
April 17, 2020

Leveraging security analytics to bolster enterprise cybersecurity

Leveraging security analytics to bolster enterprise cybersecurity

Estimated reading time: 2 minutes

Without data, you’re just another person with an opinion” – W. Edwards Deming Widely used across different industries, security analytics is slowly making its way into the domain of cybersecurity — courtesy to this industry’s rising awareness about the...
Read Blog
December 4, 2019

Renewed interests in excelling Security Operation Centres?

Renewed interests in excelling Security Operation Centres?

Estimated reading time: 2 minutes

According to Gartner’s Top 7 Security and Risk Trends 2019 report, a renewed interest towards excelling Security Operation Centres (SOCs) has been considered as among the top two new trends of the year. The evolution of the Security Operations...
Read Blog
November 1, 2019

Ransomware As A Tool – LockerGoga

Ransomware As A Tool – LockerGoga

Estimated reading time: 4 minutes

Ransomware authors keep experimenting with the development of payload in various dimensions. In the timeline of ransomware implementations, we have seen its evolution from a simple screen locker to multi-component model for file encryption, from novice approach to a...
Read Blog
July 3, 2019

Why someone needs VPN?

Why someone needs VPN?

Estimated reading time: 3 minutes

What is VPN? A VPN, or virtual private network, is a secure tunnel between your device and the internet. It is an encrypted connection which is used to protect your online traffic from snooping, interference, and censorship. It allows...
Read Blog
July 2, 2019

Email technology and its security in nutshell

Email technology and its security in nutshell

Estimated reading time: 5 minutes

Email has become a necessity of day-to-day communication. We can realize the importance of email with the fact that the down-time of organization email server directly affects the organization’s productivity. Email has become most prominent and integral part of...
Read Blog
June 26, 2019

Beware! Email attachments can make you victim of spear phishing attacks

Beware! Email attachments can make you victim of spear phishing attacks

Estimated reading time: 4 minutes

In the last few months, we’ve seen a sudden increase in Spear Phishing attacks. Spear phishing is a variation of a phishing scam wherein hackers send a targeted email to an individual which appears to be from a trusted source. In...
Read Blog
June 21, 2019

APT-27 like Newcore RAT, Virut exploiting MySQL for targeted attacks on enterprise

APT-27 like Newcore RAT, Virut exploiting MySQL for targeted attacks on enterprise

Estimated reading time: 7 minutes

In today’s world data is everything, and to store and process this large amount of data, everyone started using computing devices. Database servers which are used for storing this precious data on computing devices include MySQL, MongoDB, MSSQL, etc....
Read Blog
May 28, 2019

Seqrite Endpoint Security supports the Windows 10 May 2019 Update

Seqrite Endpoint Security supports the Windows 10 May 2019 Update

Estimated reading time: 2 minutes

As part of the Windows 10 Updates, Microsoft has now come up with a new update for Windows 10 PCs. It’s called Windows 10 19H1 (Windows 10 May 2019 Update). This post lists down some of the highlights of...
Read Blog
May 23, 2019
← Previous 1 2 3 … 21 Next →
Featured Authors
  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director of Quick Heal Technologies...

    Read more..
  • Mahua Chakrabarthy
    Mahua Chakrabarthy

    A tea connoisseur who firmly believes that life is too short for dull content....

    Read more..
Topics
apt (19) Cyber-attack (35) cyber-attacks (58) cyberattack (16) cyberattacks (13) Cybersecurity (322) cyber security (31) Cyber threat (33) cyber threats (48) Data (11) data breach (55) data breaches (28) data loss (28) data loss prevention (34) data privacy (11) data protection (24) data security (15) DLP (49) Encryption (16) endpoint security (107) Enterprise security (17) Exploit (14) firewall (11) GDPR (12) hackers (11) malware (76) malware attack (23) malware attacks (12) MDM (25) Microsoft (15) Network security (22) Patch Management (12) phishing (27) Ransomware (67) ransomware attack (30) ransomware attacks (30) ransomware protection (13) security (11) Seqrite (33) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (16) windows (11)
Loading
Resources
  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies
About Us
  • About Seqrite
  • Leadership
  • Awards & Certifications
  • Newsroom
Archives
  • By Date
  • By Category
Loading

© 2025 Quick Heal Technologies Ltd. Cookie Policies Privacy Policies