• News
  • Security
  • Products
  • About Seqrite
Blogs on Information Technology, Network & Cybersecurity | Seqrite Blog
  • News
  • Security
  • Products
  • About Seqrite

Information Technology, Network Security & Cybersecurity Updates

Could geopolitical tensions lead to large-scale cyberattacks?

Could geopolitical tensions lead to large-scale cyberattacks?

Estimated reading time: 2 minutes

The prospect of geopolitical tensions leading to large-scale cyberattacks is a very real one. Nor would it be a new development – nation-states have been using cyberattacks as a warfare technique for more than a decade now. Perhaps the...
Read Blog
October 23, 2020

Seqrite Endpoint Security Cloud Supports Windows 10 October 2020 Update

Seqrite Endpoint Security Cloud Supports Windows 10 October 2020 Update

Estimated reading time: 2 minutes

Microsoft has recently come up with a new update for Windows 10 PCs, called Windows 10 October 2020 Update (Build version 20H2). Here is the list of some highlights of this update and see how Seqrite Endpoint Security Cloud...
Read Blog
October 22, 2020

Attacks on the defence sector could prove very costly!

Attacks on the defence sector could prove very costly!

Estimated reading time: 2 minutes

In the current modern era of information warfare, securing military assets has become strategically very important. Recently, Seqrite reported on Operation ‘Honey Trap’, an operation launched by a Pakistan-linked threat actor allegedly, which targeted employees from Indian defence organizations....
Read Blog
October 16, 2020

Are you making these common public cloud migration mistakes?

Are you making these common public cloud migration mistakes?

Estimated reading time: 2 minutes

Enterprises are increasingly migrating operations to the public cloud, enthused by the many benefits it offers. By embracing cloud competencies, enterprises can become leaner and faster, enabling their employees to access information and services from wherever they are. It...
Read Blog
October 9, 2020

The Evergreen ‘Make’ Utility: A cost-effective way of deployments on Cloud.

The Evergreen ‘Make’ Utility: A cost-effective way of deployments on Cloud.

Estimated reading time: 2 minutes

It might be difficult to find a software engineer who does not know ‘Make’ utility. ‘GNU Make’ is a tool which controls the generation of executables and other stuff related to the application code building. Capabilities of ‘Make’ are...
Read Blog
October 1, 2020

The return of the Emotet as the world unlocks!

The return of the Emotet as the world unlocks!

Estimated reading time: 5 minutes

A threat actor named Emotet Trojan has been in the wild for more than 5 years, and now it is back after a 5 months break. It has spread globally, infecting new as well as old targets. It is...
Read Blog
September 29, 2020

Operation SideCopy!

Operation SideCopy!

Estimated reading time: 2 minutes

An insight into Transparent Tribe’s sub-division which has been incorrectly attributed for years. Introduction Quick Heal’s threat intelligence team recently uncovered evidence of an advanced persistent threat (APT) against Indian defence forces. Our analysis shows that many old campaigns...
Read Blog
September 23, 2020
4

Could you be blindsided when your CEO emails you?

Could you be blindsided when your CEO emails you?

Estimated reading time: 2 minutes

Whaling attacks are a deadly combination of spear-phishing and social engineering. Like phishing attacks, the attempts of the perpetrators are similar – to get a target to reveal confidential data or even get tricked and send money. But whaling...
Read Blog
September 22, 2020

Deploy a layered security model through Seqrite!

Deploy a layered security model through Seqrite!

Estimated reading time: 2 minutes

To understand the concept of layered security, it’s important to remember a key tenet of cybersecurity – no security solution is infallible. As security experts state, it’s not a question of how, but when. Cybercrooks are evolving everyday to...
Read Blog
September 17, 2020

Did you know that adversaries are planning to steal your data?

Did you know that adversaries are planning to steal your data?

Estimated reading time: 2 minutes

How valuable is data? A good way to answer that question is to look at the average cost of a data breach. Recent research in May 2020 found that the average cost of a data breach was USD 3.92...
Read Blog
September 11, 2020
← Previous 1 … 17 18 19 … 73 Next →
Featured Authors
  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director of Quick Heal Technologies...

    Read more..
  • Mahua Chakrabarthy
    Mahua Chakrabarthy

    A tea connoisseur who firmly believes that life is too short for dull content....

    Read more..
Topics
apt (19) Cyber-attack (35) cyber-attacks (58) cyberattack (16) cyberattacks (13) Cybersecurity (322) cyber security (31) Cyber threat (33) cyber threats (48) Data (11) data breach (55) data breaches (28) data loss (28) data loss prevention (34) data privacy (11) data protection (24) data security (15) DLP (49) Encryption (16) endpoint security (107) Enterprise security (17) Exploit (14) firewall (11) GDPR (12) hackers (11) malware (76) malware attack (23) malware attacks (12) MDM (25) Microsoft (15) Network security (22) Patch Management (12) phishing (27) Ransomware (67) ransomware attack (30) ransomware attacks (30) ransomware protection (13) security (11) Seqrite (33) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (16) windows (11)
Loading
Resources
  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies
About Us
  • About Seqrite
  • Leadership
  • Awards & Certifications
  • Newsroom
Archives
  • By Date
  • By Category
Loading

© 2025 Quick Heal Technologies Ltd. Cookie Policies Privacy Policies