• News
  • Security
  • Products
  • About Seqrite
Blogs on Information Technology, Network & Cybersecurity | Seqrite Blog
  • News
  • Security
  • Products
  • About Seqrite

Information Technology, Network Security & Cybersecurity Updates

Deploy a layered security model through Seqrite!

Deploy a layered security model through Seqrite!

Estimated reading time: 2 minutes

To understand the concept of layered security, it’s important to remember a key tenet of cybersecurity – no security solution is infallible. As security experts state, it’s not a question of how, but when. Cybercrooks are evolving everyday to...
Read Blog
September 17, 2020

Did you know that adversaries are planning to steal your data?

Did you know that adversaries are planning to steal your data?

Estimated reading time: 2 minutes

How valuable is data? A good way to answer that question is to look at the average cost of a data breach. Recent research in May 2020 found that the average cost of a data breach was USD 3.92...
Read Blog
September 11, 2020

Ruthless Valak snowballs into an enterprise’s worst nightmare.

Ruthless Valak snowballs into an enterprise’s worst nightmare.

Estimated reading time: 2 minutes

A new and deadlier version of a familiar malware —it was discovered in 2019 and designated a sophisticated piece of malware, Valak was considered a type of malware loader, a type of program used to load other malware on...
Read Blog
September 9, 2020

Cybersecurity below the kernel

Cybersecurity below the kernel

Estimated reading time: 2 minutes

Security of a computing endpoint is traditionally viewed with respect to Firewall, HIPS, AV Products, etc. This perspective though misses out on “Below Kernel” aspects of cyber threats, which may target Hypervisor, Firmware or Hardware itself. Here are some...
Read Blog
August 27, 2020

PonyFinal Ransomware dubbed by many as the modern-day Trojan horse.

PonyFinal Ransomware dubbed by many as the modern-day Trojan horse.

Estimated reading time: 2 minutes

Microsoft recently warned its over 100,000 followers about the emergence of a new human-operated Java-based ransomware that has been involved in targeted attacks in the US, India and Iran. PonyFinal, the name of this malware, is an example of...
Read Blog
August 26, 2020

All you need to know about Application Programming Interface (API) Security

All you need to know about Application Programming Interface (API) Security

Estimated reading time: 4 minutes

An Application Programming Interface (API) is a way that allows applications to communicate with one another. It provides a way for developers to build software applications while enabling the extraction and sharing of data in an accessible manner. APIs...
Read Blog
August 21, 2020

Gorgon APT targeting MSME sector in India

Gorgon APT targeting MSME sector in India

Estimated reading time: 5 minutes

From the past few months, we have been monitoring cyber-threats on MSME [Micro, Small and Medium Enterprises] sector within India. MSME sector is considered to be the backbone of the Indian economy. MSME employs around 40% of the country’s...
Read Blog
August 10, 2020

AV-Test certifies Seqrite EPS as the top product for Windows, yet again!

AV-Test certifies Seqrite EPS as the top product for Windows, yet again!

Estimated reading time: 2 minutes

We are happy to announce that Seqrite’s Endpoint Security has yet again been tested and certified by the prestigious AV-Test Org as the best security product for Windows. The latter ran extensive tests on the existing capabilities of EPS...
Read Blog
August 7, 2020

Legacy Systems longing for enterprise attention?

Legacy Systems longing for enterprise attention?

Estimated reading time: 3 minutes

Legacy systems such as mainframes may be considered outdated by today’s standards but they continue to play major roles in many sectors, primarily finance, government, retail, healthcare and insurance. In these industries, they are crucial parts of day-to-day operations,...
Read Blog
August 6, 2020

MassLogger: An Emerging Spyware and Keylogger

MassLogger: An Emerging Spyware and Keylogger

Estimated reading time: 7 minutes

Summary: We have been dealing with a new spyware for the past two months, named MassLogger. This advanced keylogger and spyware are distributed via MalSpam attachments and has more features than other present keylogger tools. It has been observed...
Read Blog
July 31, 2020
← Previous 1 … 17 18 19 … 72 Next →
Featured Authors
  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director of Quick Heal Technologies...

    Read more..
  • Mahua Chakrabarthy
    Mahua Chakrabarthy

    A tea connoisseur who firmly believes that life is too short for dull content....

    Read more..
Topics
apt (19) Cyber-attack (35) cyber-attacks (58) cyberattack (16) cyberattacks (13) Cybersecurity (319) cyber security (30) Cyber threat (33) cyber threats (48) Data (11) data breach (55) data breaches (28) data loss (28) data loss prevention (34) data protection (24) data security (15) DLP (49) Encryption (16) endpoint security (106) Enterprise security (17) Exploit (14) firewall (11) GDPR (12) hackers (11) IoT (10) malware (76) malware attack (23) malware attacks (12) MDM (25) Microsoft (15) Network security (22) Patch Management (12) phishing (27) Ransomware (67) ransomware attack (30) ransomware attacks (30) ransomware protection (13) security (11) Seqrite (33) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (16) windows (11)
Loading
Resources
  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies
About Us
  • About Seqrite
  • Leadership
  • Awards & Certifications
  • Newsroom
Archives
  • By Date
  • By Category
Loading

© 2025 Quick Heal Technologies Ltd. Cookie Policies Privacy Policies