• News
  • Security
  • Products
  • About Seqrite
Blogs on Information Technology, Network & Cybersecurity | Seqrite Blog
  • News
  • Security
  • Products
  • About Seqrite

Technical Archive

Transparent Tribe APT actively lures Indian Army amidst increased targeting of Educational Institutions

Transparent Tribe APT actively lures Indian Army amidst increased targeting of Educational Institutions

Estimated reading time: 2 minutes

Overview APT Transparent Tribe (APT36) is luring the Indian Army into opening the malicious file themed ‘Revision of Officers posting policy.’ Quick Heal’s APT Team has been constantly tracking this persistent threat group and has encountered a new attack...
Read Blog
May 2, 2023

WordPress Site Security Alert: Bookly Plugin Vulnerability Discovered and Patched

WordPress Site Security Alert: Bookly Plugin Vulnerability Discovered and Patched

Estimated reading time: 3 minutes

WordPress is a popular content management system that allows users to create and manage websites with the help of various plugins. One such plugin widely used by over 60,000 websites is the “WordPress Online Booking and Scheduling Plugin –...
Read Blog
March 29, 2023

Expiro: Old Virus Resurfaces to Cast New Challenge

Expiro: Old Virus Resurfaces to Cast New Challenge

Estimated reading time: 6 minutes

A recent virus infection faced by some users was swiftly detected as being caused by Expiro. We have conducted an in-depth investigation and analysis of the intricacies of Expiro and what makes it such a potent threat. This article...
Read Blog
February 27, 2023

Uncovering LockBit Black’s Attack Chain and Anti-forensic activity

Uncovering LockBit Black’s Attack Chain and Anti-forensic activity

Estimated reading time: 6 minutes

Since the infamous Conti ransomware group disbanded due to source code leaks during the Russia-Ukraine war, the LockBit group has claimed dominance. The group has adopted new extortion techniques and added a first-of-its-kind bug-bounty program, along with many features,...
Read Blog
February 1, 2023

Calling from the Underground: An alternative way to penetrate corporate networks

Calling from the Underground: An alternative way to penetrate corporate networks

Estimated reading time: 5 minutes

Threat actors use multiple methods to distribute malware to infect specific targets. Even though various phishing methods are actively used and evolving, an alternative approach to increase their success rate is to call the target corporate companies. Techniques like...
Read Blog
January 11, 2023

CVE-2022-26134: Actively Exploited Atlassian OGNL Injection Zero-Day Vulnerability

CVE-2022-26134: Actively Exploited Atlassian OGNL Injection Zero-Day Vulnerability

Estimated reading time: 4 minutes

On June 2, 2022, CVE-2022-26134 “Confluence,” a zero-day remote code execution vulnerability, was discovered in all versions of the Confluence Server and Data Center. The attack was detected to be of high severity (CVSS:9.0/10.0) according to a security advisory...
Read Blog
July 5, 2022
← Previous 1 … 4 5
Featured Authors
  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director of Quick Heal Technologies...

    Read more..
  • Mahua Chakrabarthy
    Mahua Chakrabarthy

    A tea connoisseur who firmly believes that life is too short for dull content....

    Read more..
Topics
apt (19) Cyber-attack (35) cyber-attacks (58) cyberattack (16) cyberattacks (13) Cybersecurity (322) cyber security (31) Cyber threat (33) cyber threats (48) Data (11) data breach (55) data breaches (28) data loss (28) data loss prevention (34) data privacy (11) data protection (24) data security (15) DLP (49) Encryption (16) endpoint security (107) Enterprise security (17) Exploit (14) firewall (11) GDPR (12) hackers (11) malware (76) malware attack (23) malware attacks (12) MDM (25) Microsoft (15) Network security (22) Patch Management (12) phishing (27) Ransomware (67) ransomware attack (30) ransomware attacks (30) ransomware protection (13) security (11) Seqrite (33) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (16) windows (11)
Loading
Resources
  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies
About Us
  • About Seqrite
  • Leadership
  • Awards & Certifications
  • Newsroom
Archives
  • By Date
  • By Category
Loading

© 2025 Quick Heal Technologies Ltd. Cookie Policies Privacy Policies