• News
  • Security
  • Products
  • About Seqrite
Blogs on Information Technology, Network & Cybersecurity | Seqrite Blog
  • News
  • Security
  • Products
  • About Seqrite

Information Technology, Network Security & Cybersecurity Updates

RAT used by Chinese cyberspies infiltrating Indian businesses

RAT used by Chinese cyberspies infiltrating Indian businesses

Estimated reading time: 4 minutes

A few months back, Delphibased malware was being distributed on multiple systems via SMB exploit. The payloads used by this malware have close similarities with open-source Gh0stRAT code. Gh0st has been used by Chinese threat actors to target multiple...
Read Blog
December 18, 2020

Are air-gapped networks completely secure?

Are air-gapped networks completely secure?

Estimated reading time: 2 minutes

An air-gapped network (or system) is isolated from all other networks. This essentially means that the system or the network is physically not connected to any outside network, whether it is the internet or a local area network. The...
Read Blog
December 17, 2020

Cybersecurity in the holiday season: minimizing the risk of cyberattacks

Cybersecurity in the holiday season: minimizing the risk of cyberattacks

Estimated reading time: 2 minutes

The holiday season is upon us. While employees take time off to be with their families and enjoy some well-deserved rest and recognition, cybersecurity cannot afford to take it easy. It’s a clear fact that the holiday season is...
Read Blog
December 11, 2020

Can cyber insurance replace cybersecurity?

Can cyber insurance replace cybersecurity?

Estimated reading time: 2 minutes

As new-age threats dominate the business landscape, an increasing number of organizations have come to identify cyber insurance as a key component of their risk management plan. Organizations understand that cybersecurity threats can cause a great deal of financial...
Read Blog
December 7, 2020

Is accelerating enterprise digital transformation leading to cyberthreats?

Is accelerating enterprise digital transformation leading to cyberthreats?

Estimated reading time: 3 minutes

Without a doubt, 2020 will go down in history as a year which changed the course of humanity. While the jury is still out on whether this change has been good or bad, it cannot be denied that the...
Read Blog
November 25, 2020

IT-OT confluence creates cybersecurity gaps for enterprises

IT-OT confluence creates cybersecurity gaps for enterprises

Estimated reading time: 2 minutes

According to Seqrite’s Threat Report from Q2 2020, the manufacturing industry saw the greatest percentage of attacks in comparison to other sectors. Other industries targeted included Power & Energy and Automobiles, all which use Operational Technology (OT) to a...
Read Blog
November 20, 2020

Thanos Ransomware Evading Anti-ransomware Protection With RIPlace Tactic

Thanos Ransomware Evading Anti-ransomware Protection With RIPlace Tactic

Estimated reading time: 5 minutes

Ransomware has come a long way in cyberspace by continuous improvement in its techniques and tactics in encrypting system files. Over the years ransomware has improvised itself by moving from PE to non-PE and standalone payloads, by using different...
Read Blog
November 18, 2020

Seqrite Endpoint Security 7.6 supports macOS Big Sur 11

Seqrite Endpoint Security 7.6 supports macOS Big Sur 11

Estimated reading time: < 1 minute

Apple has come up with a new OS called Big Sur 11 which has been released on 12 November 2020. This post lists some of the highlights of this OS and compatibility with Seqrite EPS 7.6. Key highlights 1.      ...
Read Blog
November 14, 2020

Seqrite Endpoint Security Cloud 1.4 supports macOS Big Sur 11

Seqrite Endpoint Security Cloud 1.4 supports macOS Big Sur 11

Estimated reading time: < 1 minute

Apple has come up with a new OS called Big Sur 11 which has been released on 12 November 2020. This post lists some of the highlights of this OS and compatibility with Seqrite Endpoint Security Cloud 1.4. Key...
Read Blog
November 13, 2020

Could rising unemployment lead to an increase in cybercrimes?

Could rising unemployment lead to an increase in cybercrimes?

Estimated reading time: 2 minutes

  A few numbers provide a sobering perspective of the massive global economic impact the ongoing COVID-19 pandemic has had. Early on, when the pandemic had just started, the International Labour Organization (ILO), a division of the United Nations,...
Read Blog
November 6, 2020
← Previous 1 … 15 16 17 … 72 Next →
Featured Authors
  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director of Quick Heal Technologies...

    Read more..
  • Mahua Chakrabarthy
    Mahua Chakrabarthy

    A tea connoisseur who firmly believes that life is too short for dull content....

    Read more..
Topics
apt (19) Cyber-attack (35) cyber-attacks (58) cyberattack (16) cyberattacks (13) Cybersecurity (319) cyber security (30) Cyber threat (33) cyber threats (48) Data (11) data breach (55) data breaches (28) data loss (28) data loss prevention (34) data protection (24) data security (15) DLP (49) Encryption (16) endpoint security (106) Enterprise security (17) Exploit (14) firewall (11) GDPR (12) hackers (11) IoT (10) malware (76) malware attack (23) malware attacks (12) MDM (25) Microsoft (15) Network security (22) Patch Management (12) phishing (27) Ransomware (67) ransomware attack (30) ransomware attacks (30) ransomware protection (13) security (11) Seqrite (33) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (16) windows (11)
Loading
Resources
  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies
About Us
  • About Seqrite
  • Leadership
  • Awards & Certifications
  • Newsroom
Archives
  • By Date
  • By Category
Loading

© 2025 Quick Heal Technologies Ltd. Cookie Policies Privacy Policies