• News
  • Security
  • Products
  • About Seqrite
Blogs on Information Technology, Network & Cybersecurity | Seqrite Blog
  • News
  • Security
  • Products
  • About Seqrite

Technical Archive

CVE-2024-3094 Unveiled: XZ Utils Compromise Sparks Security Alarm

CVE-2024-3094 Unveiled: XZ Utils Compromise Sparks Security Alarm

Estimated reading time: 3 minutes

On Friday, March 29, developer Andres Freund detected unusual behavior in his Debian sid environment. In response, he contacted an open-source security mailing list to report his discovery of an upstream backdoor in the commonly used command-line tool XZ...
Read Blog
April 11, 2024

MedusaLocker Ransomware: An In-Depth Technical Analysis and Prevention Strategies

MedusaLocker Ransomware: An In-Depth Technical Analysis and Prevention Strategies

Estimated reading time: 5 minutes

Our recent research has highlighted the presence of the MedusaLocker ransomware, which first surfaced in mid-2019. Its primary targets are the Hospital and Healthcare industries. MedusaLocker employs AES and RSA encryption techniques to encrypt victims’ data. Technical analysis At...
Read Blog
October 16, 2023

Critical Security Alert: CVE-2023-32315 Vulnerability in Openfire XMPP Server

Critical Security Alert: CVE-2023-32315 Vulnerability in Openfire XMPP Server

Estimated reading time: 4 minutes

Openfire is an open-source, real-time collaboration server based on the XMPP (Extensible Messaging and Presence Protocol) protocol. It facilitates instant messaging, group chat, and other real-time communication services. Openfire is popular for its flexibility, scalability, and robust security features....
Read Blog
September 14, 2023

THREAT ADVISORY: Zero-Day Vulnerabilities Detected on WinRAR

THREAT ADVISORY: Zero-Day Vulnerabilities Detected on WinRAR

Estimated reading time: 4 minutes

Zero-day vulnerabilities represent an imminent threat to cyber security, and in this case, two such vulnerabilities, CVE-2023-38831 and CVE-2023-40477, have been identified in the widely utilized WinRAR software. These vulnerabilities pose a grave concern due to their potential for...
Read Blog
September 4, 2023

CVE-2023-34362: Critical ZERO-DAY Vulnerability in MOVEit Transfer

CVE-2023-34362: Critical ZERO-DAY Vulnerability in MOVEit Transfer

Estimated reading time: 5 minutes

The discovery of a zero-day vulnerability in MOVEit Transfer has brought attention to the potential risks of unauthorized access and the exploitation of elevated privileges within the system. MOVEit Transfer is widely recognized as a secure and popular managed...
Read Blog
June 22, 2023

Delving Further: Analyzing Another XSS Vulnerability Found in the Bookly Plugin

Delving Further: Analyzing Another XSS Vulnerability Found in the Bookly Plugin

Estimated reading time: 3 minutes

Our previous blog explored an XSS vulnerability within the Bookly plugin (WordPress Online Booking and Scheduling Plugin – Bookly). Today, we will delve into another XSS vulnerability that came to light during our research on the same plugin. Our...
Read Blog
June 19, 2023

WordPress Site Security Alert: Bookly Plugin Vulnerability Discovered and Patched

WordPress Site Security Alert: Bookly Plugin Vulnerability Discovered and Patched

Estimated reading time: 3 minutes

WordPress is a popular content management system that allows users to create and manage websites with the help of various plugins. One such plugin widely used by over 60,000 websites is the “WordPress Online Booking and Scheduling Plugin –...
Read Blog
March 29, 2023

Expiro: Old Virus Resurfaces to Cast New Challenge

Expiro: Old Virus Resurfaces to Cast New Challenge

Estimated reading time: 6 minutes

A recent virus infection faced by some users was swiftly detected as being caused by Expiro. We have conducted an in-depth investigation and analysis of the intricacies of Expiro and what makes it such a potent threat. This article...
Read Blog
February 27, 2023

Uncovering LockBit Black’s Attack Chain and Anti-forensic activity

Uncovering LockBit Black’s Attack Chain and Anti-forensic activity

Estimated reading time: 6 minutes

Since the infamous Conti ransomware group disbanded due to source code leaks during the Russia-Ukraine war, the LockBit group has claimed dominance. The group has adopted new extortion techniques and added a first-of-its-kind bug-bounty program, along with many features,...
Read Blog
February 1, 2023

CVE-2022-26134: Actively Exploited Atlassian OGNL Injection Zero-Day Vulnerability

CVE-2022-26134: Actively Exploited Atlassian OGNL Injection Zero-Day Vulnerability

Estimated reading time: 4 minutes

On June 2, 2022, CVE-2022-26134 “Confluence,” a zero-day remote code execution vulnerability, was discovered in all versions of the Confluence Server and Data Center. The attack was detected to be of high severity (CVSS:9.0/10.0) according to a security advisory...
Read Blog
July 5, 2022
← Previous 1 … 5 6
Featured Authors
  • Seqrite
    Seqrite

    Seqrite is a leading enterprise cybersecurity solutions provider. With a focus...

    Read more..
  • Jyoti Karlekar
    Jyoti Karlekar

    I'm an avid writer who enjoys crafting content about emerging technologies and...

    Read more..
  • Bineesh P
    Bineesh P

    I am a passionate cybersecurity enthusiast and a dedicated writer. With a knack...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director of Quick Heal Technologies...

    Read more..
Topics
apt (25) Cyber-attack (36) cyber-attacks (58) cyberattack (16) cyberattacks (15) Cybersecurity (334) cyber security (34) Cyber threat (33) cyber threats (50) data breach (56) data breaches (29) data loss (28) data loss prevention (33) data privacy (14) data protection (30) data security (15) DLP (49) DPDP (13) DPDPA (14) Encryption (16) endpoint security (110) Enterprise security (18) Exploit (13) GDPR (13) malware (76) malware analysis (13) malware attack (23) malware attacks (12) MDM (27) Microsoft (15) Network security (24) Patch Management (12) phishing (29) Ransomware (69) ransomware attack (30) ransomware attacks (30) ransomware protection (14) Seqrite (40) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) Threat Intelligence (13) UTM (34) Vulnerability (16) zero trust (13)
Loading
Blogs on Information Technology, Network & Cybersecurity | Seqrite

Leading enterprise IT security solutions provider simplifying endpoint, data, and network security with best-in-class threat prevention, detection, and response solutions worldwide.

Read More

Follow us:

Subscribe To Our Newsletter

Stay informed about the latest cybersecurity trends and insights.

Loading
Products & Services
  • Cloud
  • Endpoint Protection
  • Endpoint Detection and Response
  • Mobile Device Management
  • BYOD
  • Extended Detection and Response
  • Zero Trust Network Access
  • Data Privacy
  • On Prem
  • Endpoint Protection
  • Endpoint Detection and Response
  • Data Privacy
  • Platform
  • Malware Analysis Platform
  • Micro Business
  • SOHO Total Edition
  • Services
  • Threat Intel
  • Digital Risk Protection Services (DRPS)
  • Ransomware Recovery as a Services (RRaaS)
  • DPDP Compliance
  • Managed Detection and Response
Resources
  • Blogs
  • Whitepapers
  • Datasheets
  • Threat Reports
  • Manuals
  • Policy & Compliance
  • EULA
  • PoV
  • GoDeep.AI
Contact Us
  • Registered Offices
  • Nearest Offices
  • Let’s Talk Cybersecurity
Support
  • Technical Support
  • Download Software
  • Offline Updater
  • Firmware Upgrades
  • Upgrades
  • Product Documentation
About Us
  • About Seqrite
  • Leadership
  • Awards & Recognition
  • Newsroom
Partner
  • Partner Program
  • Locate Partner
  • Become A Partner
  • Seqrite Certification

© 2026 Quick Heal Technologies Ltd. Cookie Policies Privacy Policies