• News
  • Security
  • Products
  • About Seqrite
Blogs on Information Technology, Network & Cybersecurity | Seqrite Blog
  • News
  • Security
  • Products
  • About Seqrite

Security Archive

What is a Red Team Assessment and why does RBI endorse it?

What is a Red Team Assessment and why does RBI endorse it?

Estimated reading time: 3 minutes

When it comes to cybersecurity for enterprises, one sector that finds itself at a lot of risk is the banking sector. Banks conduct financial transactions which can be worth millions in value every single day which mean they present...
Read Blog
September 25, 2018
8
Shares
1

CVE-2018-8440 – Task Scheduler ALPC Zero-Day Exploit in the Wild

CVE-2018-8440 – Task Scheduler ALPC Zero-Day Exploit in the Wild

Estimated reading time: < 1 minute

The recent zero-day vulnerability CVE-2018-8440 in Windows Task Scheduler enables attackers to perform a privilege elevation on targeted machines. Microsoft has released a security advisory CVE-2018-8440 on September 11, 2018 to address this issue. According to Microsoft, successful exploitation...
Read Blog
September 12, 2018

I am invisible – Monero (XMR) Miner

I am invisible – Monero (XMR) Miner

Estimated reading time: 4 minutes

From the last one year, Quick Heal Security Labs has been observing a boost in the number of mining malware. Nowadays malware authors are using mining as a replacement for Ransomware to make money. Recently Quick Heal Security Labs...
Read Blog
September 3, 2018

Is your bank really safe from cyber threats? Conduct Red Team Assessment to know.

Is your bank really safe from cyber threats? Conduct Red Team Assessment to know.

Estimated reading time: 2 minutes

As cyber-attacks continue to affect businesses, it is banks that are the most lucrative target for cybercriminals. Beyond having their reputation at stake, banks also risk customer’s money and data, amplified regulatory attention and even litigation. The stakes are...
Read Blog
August 31, 2018
18
Shares

Importance of industry certifications for security products and what do they mean

Importance of industry certifications for security products and what do they mean

Estimated reading time: 3 minutes

The importance of cybersecurity has slowly seeped into the consciousness of enterprises. A cybercrime can undo years of work in an instant and enterprises are recognizing this and trying to find ways to stay safe. Hence, investment in security...
Read Blog
August 16, 2018
3
Shares

The evolution of a 4-year-old-threat Emotet: From an infamous Trojan to a complex threat distributer

The evolution of a 4-year-old-threat Emotet: From an infamous Trojan to a complex threat distributer

Estimated reading time: 6 minutes

Emotet malware campaign has been existing for a long time. It comes frequently in intervals with different techniques and variants to deliver malware on a victim. Attackers are smart and they use complex techniques to avoid detection. At the...
Read Blog
July 25, 2018
1

Your copy-paste habit can cost you your money

Your copy-paste habit can cost you your money

Estimated reading time: 4 minutes

How often do you store your important data in files? It’s very common, right? This data may be URLs, topics, personal data like contacts, email-ids, usernames of different portals and sometimes passwords too (though always recommended to not to...
Read Blog
July 19, 2018
5
Shares

Latest cyber threats you should know about

Latest cyber threats you should know about

Estimated reading time: 3 minutes

Cybersecurity threats are often like an ever-changing monster – you just can’t defeat it. A strong anti-virus solution with all the other necessary tools will help you secure your organization’s defense but it’s impossible to control what is happening...
Read Blog
June 26, 2018
9
Shares

What is the mystery about the Deep and Dark Web?

What is the mystery about the Deep and Dark Web?

Estimated reading time: 3 minutes

Deep Web. Dark Web. Ransomware. Tor. Illegal activities. Bitcoin. A cursory search of the first two terms would reveal a range of web pages, all talking about the next four terms. The mystery and suspense the deep and dark...
Read Blog
June 19, 2018
6
Shares

CVE-2018-5002 – Adobe Flash Player Stack Buffer Overflow Vulnerability Alert!

CVE-2018-5002 – Adobe Flash Player Stack Buffer Overflow Vulnerability Alert!

Estimated reading time: < 1 minute

The recent zero-day vulnerability CVE-2018-5002 in Adobe Flash Player enables attackers to perform a Remote Code Execution on targeted machines. Adobe has released a security advisory APSB18-19 on June 7, 2018 to address this issue. According to Adobe, the...
Read Blog
June 8, 2018
← Previous 1 … 4 5 6 … 21 Next →
Featured Authors
  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director of Quick Heal Technologies...

    Read more..
  • Mahua Chakrabarthy
    Mahua Chakrabarthy

    A tea connoisseur who firmly believes that life is too short for dull content....

    Read more..
Topics
apt (19) Cyber-attack (35) cyber-attacks (58) cyberattack (16) cyberattacks (13) Cybersecurity (322) cyber security (31) Cyber threat (33) cyber threats (48) Data (11) data breach (55) data breaches (28) data loss (28) data loss prevention (34) data privacy (11) data protection (24) data security (15) DLP (49) Encryption (16) endpoint security (107) Enterprise security (17) Exploit (14) firewall (11) GDPR (12) hackers (11) malware (76) malware attack (23) malware attacks (12) MDM (25) Microsoft (15) Network security (22) Patch Management (12) phishing (27) Ransomware (67) ransomware attack (30) ransomware attacks (30) ransomware protection (13) security (11) Seqrite (33) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (16) windows (11)
Loading
Resources
  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies
About Us
  • About Seqrite
  • Leadership
  • Awards & Certifications
  • Newsroom
Archives
  • By Date
  • By Category
Loading

© 2025 Quick Heal Technologies Ltd. Cookie Policies Privacy Policies