• News
  • Security
  • Products
  • About Seqrite
Blogs on Information Technology, Network & Cybersecurity | Seqrite Blog
  • News
  • Security
  • Products
  • About Seqrite

Information Technology, Network Security & Cybersecurity Updates

Decoding The Digital Personal Data Protection Act, 2023 In 7 Key Points

Decoding The Digital Personal Data Protection Act, 2023 In 7 Key Points

Estimated reading time: 4 minutes

Data protection laws have become increasingly relevant in today’s digital age, where businesses collect, store, and process large amounts of personally identifiable information. With India gradually emerging as a data-driven economy, the recent Digital Personal Data Protection (DPDP) Act...
Read Blog
August 25, 2023

The Critical Importance of Cyber Securing ISRO’s Space Missions

The Critical Importance of Cyber Securing ISRO’s Space Missions

Estimated reading time: 3 minutes

In a monumental leap for India’s space exploration journey, the Indian Space Research Organisation (ISRO) has captured the world’s attention with its successful Chandrayaan 3 moon landing. The culmination of meticulous planning, dedication, and scientific prowess, this achievement marks...
Read Blog
August 24, 2023

Threat Advisory: Mallox Ransomware Strikes Unsecured MSSQL Servers

Threat Advisory: Mallox Ransomware Strikes Unsecured MSSQL Servers

Estimated reading time: 3 minutes

We have observed a sudden increase in Ransomware incidents since June 2023, involving the appending of the “.malox” file extension to encrypt files. This Ransomware has been identified as a variant of the Mallox (aka TargetCompany) Ransomware Family. The...
Read Blog
August 4, 2023

XDR is Dead. Long Live XDR!

XDR is Dead. Long Live XDR!

Estimated reading time: 3 minutes

XDR as a technology was developed as an improvement over EDR. EDR itself was conceptualized based on a real need of the market – a product that would help detect advanced attacks by analyzing historical endpoint activity data and...
Read Blog
July 5, 2023

CVE-2023-34362: Critical ZERO-DAY Vulnerability in MOVEit Transfer

CVE-2023-34362: Critical ZERO-DAY Vulnerability in MOVEit Transfer

Estimated reading time: 5 minutes

The discovery of a zero-day vulnerability in MOVEit Transfer has brought attention to the potential risks of unauthorized access and the exploitation of elevated privileges within the system. MOVEit Transfer is widely recognized as a secure and popular managed...
Read Blog
June 22, 2023

Delving Further: Analyzing Another XSS Vulnerability Found in the Bookly Plugin

Delving Further: Analyzing Another XSS Vulnerability Found in the Bookly Plugin

Estimated reading time: 3 minutes

Our previous blog explored an XSS vulnerability within the Bookly plugin (WordPress Online Booking and Scheduling Plugin – Bookly). Today, we will delve into another XSS vulnerability that came to light during our research on the same plugin. Our...
Read Blog
June 19, 2023

Double Action, Triple Infection, and a New RAT: SideCopy’s Persistent Targeting of Indian Defence

Double Action, Triple Infection, and a New RAT: SideCopy’s Persistent Targeting of Indian Defence

Estimated reading time: 3 minutes

Overview A new attack campaign of SideCopy APT has been discovered targeting the Indian Defence sector. The group utilizes phishing email attachments & URLs as the infection vector to download malicious archive files leading to the deployment of two...
Read Blog
June 15, 2023

Supercharge your security operations with end-to-end visibility, protection, and response using SEQRITE XDR

Supercharge your security operations with end-to-end visibility, protection, and response using SEQRITE XDR

Estimated reading time: 3 minutes

In today’s ever-evolving threat landscape, an organization’s security operations have never been more crucial. The complexity of remote work and multiple devices, apps, and tools has expanded the attack surface. Cybercriminals use advanced tactics, including AI-powered spear-phishing attacks on...
Read Blog
June 8, 2023

Transparent Tribe APT actively lures Indian Army amidst increased targeting of Educational Institutions

Transparent Tribe APT actively lures Indian Army amidst increased targeting of Educational Institutions

Estimated reading time: 2 minutes

Overview APT Transparent Tribe (APT36) is luring the Indian Army into opening the malicious file themed ‘Revision of Officers posting policy.’ Quick Heal’s APT Team has been constantly tracking this persistent threat group and has encountered a new attack...
Read Blog
May 2, 2023

Unseen Threats Lurking: Protect Your Small Business from Cyberattacks with the Right Defence Strategy

Unseen Threats Lurking: Protect Your Small Business from Cyberattacks with the Right Defence Strategy

Estimated reading time: 5 minutes

The pandemic has expedited digital transformation, making technology and data pivotal to most businesses. However, it has also increased cyber threats, especially for small and medium-sized enterprises (SMBs). In addition, data regulations have also become more stringent, with fines...
Read Blog
April 25, 2023
← Previous 1 … 9 10 11 … 72 Next →
Featured Authors
  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director of Quick Heal Technologies...

    Read more..
  • Mahua Chakrabarthy
    Mahua Chakrabarthy

    A tea connoisseur who firmly believes that life is too short for dull content....

    Read more..
Topics
apt (19) Cyber-attack (35) cyber-attacks (58) cyberattack (16) cyberattacks (13) Cybersecurity (321) cyber security (30) Cyber threat (33) cyber threats (48) Data (11) data breach (55) data breaches (28) data loss (28) data loss prevention (34) data protection (24) data security (15) DLP (49) Encryption (16) endpoint security (106) Enterprise security (17) Exploit (14) firewall (11) GDPR (12) hackers (11) IoT (10) malware (76) malware attack (23) malware attacks (12) MDM (25) Microsoft (15) Network security (22) Patch Management (12) phishing (27) Ransomware (67) ransomware attack (30) ransomware attacks (30) ransomware protection (13) security (11) Seqrite (33) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (16) windows (11)
Loading
Resources
  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies
About Us
  • About Seqrite
  • Leadership
  • Awards & Certifications
  • Newsroom
Archives
  • By Date
  • By Category
Loading

© 2025 Quick Heal Technologies Ltd. Cookie Policies Privacy Policies