• News
  • Security
  • Products
  • About Seqrite
Blogs on Information Technology, Network & Cybersecurity | Seqrite Blog
  • News
  • Security
  • Products
  • About Seqrite

Information Technology, Network Security & Cybersecurity Updates

XDR is Dead. Long Live XDR!

XDR is Dead. Long Live XDR!

Estimated reading time: 3 minutes

XDR as a technology was developed as an improvement over EDR. EDR itself was conceptualized based on a real need of the market – a product that would help detect advanced attacks by analyzing historical endpoint activity data and...
Read Blog
July 5, 2023

CVE-2023-34362: Critical ZERO-DAY Vulnerability in MOVEit Transfer

CVE-2023-34362: Critical ZERO-DAY Vulnerability in MOVEit Transfer

Estimated reading time: 5 minutes

The discovery of a zero-day vulnerability in MOVEit Transfer has brought attention to the potential risks of unauthorized access and the exploitation of elevated privileges within the system. MOVEit Transfer is widely recognized as a secure and popular managed...
Read Blog
June 22, 2023

Delving Further: Analyzing Another XSS Vulnerability Found in the Bookly Plugin

Delving Further: Analyzing Another XSS Vulnerability Found in the Bookly Plugin

Estimated reading time: 3 minutes

Our previous blog explored an XSS vulnerability within the Bookly plugin (WordPress Online Booking and Scheduling Plugin – Bookly). Today, we will delve into another XSS vulnerability that came to light during our research on the same plugin. Our...
Read Blog
June 19, 2023

Double Action, Triple Infection, and a New RAT: SideCopy’s Persistent Targeting of Indian Defence

Double Action, Triple Infection, and a New RAT: SideCopy’s Persistent Targeting of Indian Defence

Estimated reading time: 3 minutes

Overview A new attack campaign of SideCopy APT has been discovered targeting the Indian Defence sector. The group utilizes phishing email attachments & URLs as the infection vector to download malicious archive files leading to the deployment of two...
Read Blog
June 15, 2023

Supercharge your security operations with end-to-end visibility, protection, and response using SEQRITE XDR

Supercharge your security operations with end-to-end visibility, protection, and response using SEQRITE XDR

Estimated reading time: 3 minutes

In today’s ever-evolving threat landscape, an organization’s security operations have never been more crucial. The complexity of remote work and multiple devices, apps, and tools has expanded the attack surface. Cybercriminals use advanced tactics, including AI-powered spear-phishing attacks on...
Read Blog
June 8, 2023

Transparent Tribe APT actively lures Indian Army amidst increased targeting of Educational Institutions

Transparent Tribe APT actively lures Indian Army amidst increased targeting of Educational Institutions

Estimated reading time: 2 minutes

Overview APT Transparent Tribe (APT36) is luring the Indian Army into opening the malicious file themed ‘Revision of Officers posting policy.’ Quick Heal’s APT Team has been constantly tracking this persistent threat group and has encountered a new attack...
Read Blog
May 2, 2023

Unseen Threats Lurking: Protect Your Small Business from Cyberattacks with the Right Defence Strategy

Unseen Threats Lurking: Protect Your Small Business from Cyberattacks with the Right Defence Strategy

Estimated reading time: 5 minutes

The pandemic has expedited digital transformation, making technology and data pivotal to most businesses. However, it has also increased cyber threats, especially for small and medium-sized enterprises (SMBs). In addition, data regulations have also become more stringent, with fines...
Read Blog
April 25, 2023

Healthcare on High Alert: The Alarming Rise of Cyberattacks on eInfra Sends Shockwaves Through the Industry – Are You Safe?

Healthcare on High Alert: The Alarming Rise of Cyberattacks on eInfra Sends Shockwaves Through the Industry – Are You Safe?

Estimated reading time: 3 minutes

The world of healthcare is rapidly changing. Technological advancements expose organizations to cyber risks, including ransomware, malware, breaches, viruses, and vulnerabilities. The combination of poor cybersecurity practices, digital transformation in care delivery, operational touchpoints, and sensitive data storage makes...
Read Blog
April 11, 2023

WordPress Site Security Alert: Bookly Plugin Vulnerability Discovered and Patched

WordPress Site Security Alert: Bookly Plugin Vulnerability Discovered and Patched

Estimated reading time: 3 minutes

WordPress is a popular content management system that allows users to create and manage websites with the help of various plugins. One such plugin widely used by over 60,000 websites is the “WordPress Online Booking and Scheduling Plugin –...
Read Blog
March 29, 2023

Expiro: Old Virus Resurfaces to Cast New Challenge

Expiro: Old Virus Resurfaces to Cast New Challenge

Estimated reading time: 6 minutes

A recent virus infection faced by some users was swiftly detected as being caused by Expiro. We have conducted an in-depth investigation and analysis of the intricacies of Expiro and what makes it such a potent threat. This article...
Read Blog
February 27, 2023
← Previous 1 … 9 10 11 … 72 Next →
Featured Authors
  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director of Quick Heal Technologies...

    Read more..
  • Mahua Chakrabarthy
    Mahua Chakrabarthy

    A tea connoisseur who firmly believes that life is too short for dull content....

    Read more..
Topics
apt (19) Cyber-attack (35) cyber-attacks (58) cyberattack (16) cyberattacks (13) Cybersecurity (319) cyber security (30) Cyber threat (33) cyber threats (48) Data (11) data breach (55) data breaches (28) data loss (28) data loss prevention (34) data protection (24) data security (15) DLP (49) Encryption (16) endpoint security (106) Enterprise security (17) Exploit (14) firewall (11) GDPR (12) hackers (11) IoT (10) malware (76) malware attack (23) malware attacks (12) MDM (25) Microsoft (15) Network security (22) Patch Management (12) phishing (27) Ransomware (67) ransomware attack (30) ransomware attacks (30) ransomware protection (13) security (11) Seqrite (33) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (16) windows (11)
Loading
Resources
  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies
About Us
  • About Seqrite
  • Leadership
  • Awards & Certifications
  • Newsroom
Archives
  • By Date
  • By Category
Loading

© 2025 Quick Heal Technologies Ltd. Cookie Policies Privacy Policies