• News
  • Security
  • Products
  • About Seqrite
Blogs on Information Technology, Network & Cybersecurity | Seqrite Blog
  • News
  • Security
  • Products
  • About Seqrite

Information Technology, Network Security & Cybersecurity Updates

Operation DupeHike : UNG0902 targets Russian employees with DUPERUNNER and AdaptixC2

Operation DupeHike : UNG0902 targets Russian employees with DUPERUNNER and AdaptixC2

Estimated reading time: 11 minutes

Contents Introduction Key Targets. Industries Affected. Geographical Focus. Infection Chain. Initial Findings. Looking into the decoy-document Technical Analysis Stage 1 – Malicious LNK Script Stage 2 – DUPERUNNER Implant Stage 3 – AdaptixC2 Beacon. Infrastructural Artefacts. Conclusion SEQRITE Protection....
Read Blog
December 3, 2025

DPDP Act Redefines Banking Rules: What India’s Banks Need to Know

DPDP Act Redefines Banking Rules: What India’s Banks Need to Know

Estimated reading time: 4 minutes

Fortifying India’s Banking Backbone: How the DPDP Act Redefines the Rules of the Game India’s banks aren’t just financial institutions; they’re the backbone of the economy. Every month, UPI alone processes a jaw-dropping ₹251 lakh crore in transactions (source)....
Read Blog
December 3, 2025

Operation Hanoi Thief: Threat Actor targets Vietnamese IT professionals and recruitment teams.

Operation Hanoi Thief: Threat Actor targets Vietnamese IT professionals and recruitment teams.

Estimated reading time: 10 minutes

Table of Contents Introduction Key Targets. Industries Affected. Geographical Focus. Infection Chain. Initial Findings Looking into the decoy-document Technical Analysis Stage 1 – Malicious LNK Script Stage 2 – Pseudo-Polyglot Trick: All in One. Stage 3 – Final Payload:...
Read Blog
November 28, 2025

A Strategic Budget Blueprint for DPDP Compliance: Phased Investment for Risk Reduction and Operational Readiness

A Strategic Budget Blueprint for DPDP Compliance: Phased Investment for Risk Reduction and Operational Readiness

Estimated reading time: 3 minutes

India’s Digital Personal Data Protection (DPDP) Act represents a significant regulatory shift that affects every Data Fiduciary handling the personal data of Indian Data Principals. With penalties reaching ₹250 crore, the Act elevates data protection from a routine compliance...
Read Blog
November 26, 2025

DPDP Rules Are Here: What Changed from the Draft?

DPDP Rules Are Here: What Changed from the Draft?

Estimated reading time: 5 minutes

India has officially notified the Digital Personal Data Protection (DPDP) Rules, 2025, turning the DPDP Act from a policy framework into an enforceable compliance regime. These rules define how organizations must collect, process, secure, and store personal data, while...
Read Blog
November 14, 2025

Redis 8.2.2: Hardening the Lua Engine Against Four Critical Vulnerabilities

Redis 8.2.2: Hardening the Lua Engine Against Four Critical Vulnerabilities

Estimated reading time: 7 minutes

Introduction Redis is an open-source, in-memory data store widely used as a cache, message broker, and high-performance NoSQL database. It offers rich data structures like strings, hashes, lists, sets, sorted sets, bitmaps, HyperLogLogs, and streams, backed by atomic operations...
Read Blog
November 13, 2025

Zero Trust: The Next Step for Rural and Cooperative Bank Security

Zero Trust: The Next Step for Rural and Cooperative Bank Security

Estimated reading time: 4 minutes

India’s banking ecosystem has witnessed remarkable digital progress in recent years, with rural and cooperative banks playing a pivotal role in this transformation. From Aadhaar-enabled payments to mobile banking, these institutions have played a crucial role in bringing financial...
Read Blog
November 11, 2025

Securing India’s Financial Future: Why the DPDP Act is a Game-Changer for BFSI

Securing India’s Financial Future: Why the DPDP Act is a Game-Changer for BFSI

Estimated reading time: 4 minutes

India’s Banking, Financial Services, and Insurance (BFSI) industry stands at the intersection of innovation and risk. From UPI and digital wallets to AI-based lending and predictive underwriting, digital transformation is no longer a differentiator — it’s the operating model...
Read Blog
November 5, 2025

Operation Peek-a-Baku: Silent Lynx APT makes sluggish shift to Dushanbe

Operation Peek-a-Baku: Silent Lynx APT makes sluggish shift to Dushanbe

Estimated reading time: 17 minutes

Introduction Timeline Key Targets. Industries Affected. Geographical Focus. Infection Chain. Initial Findings. Technical Analysis. Campaign – I The LNK Way. Malicious SILENT LOADER Malicious LAPLAS Implant – TCP & TLS. Malicious .NET Implant – SilentSweeper Campaign – II Malicious...
Read Blog
November 3, 2025

Operation SkyCloak: Tor Campaign targets Military of Russia & Belarus

Operation SkyCloak: Tor Campaign targets Military of Russia & Belarus

Estimated reading time: 7 minutes

Authors: Sathwik Ram Prakki and Kartikkumar Jivani  Contents  Introduction  Key Targets  Industries  Geographical Focus  Infection and Decoys  Technical Analysis  PowerShell Stage  Persistence  Configuration  Infrastructure and Attribution  Conclusion  SEQRITE Protection  IOCs  MITRE ATT&CK  Introduction  SEQRITE Labs has identified a campaign...
Read Blog
October 31, 2025
← Previous 1 2 3 … 79 Next →
Featured Authors
  • Seqrite
    Seqrite

    Seqrite is a leading enterprise cybersecurity solutions provider. With a focus...

    Read more..
  • Jyoti Karlekar
    Jyoti Karlekar

    I'm an avid writer who enjoys crafting content about emerging technologies and...

    Read more..
  • Bineesh P
    Bineesh P

    I am a passionate cybersecurity enthusiast and a dedicated writer. With a knack...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director of Quick Heal Technologies...

    Read more..
Topics
apt (25) Cyber-attack (36) cyber-attacks (58) cyberattack (16) cyberattacks (15) Cybersecurity (334) cyber security (34) Cyber threat (33) cyber threats (50) data breach (56) data breaches (29) data loss (28) data loss prevention (33) data privacy (14) data protection (30) data security (15) DLP (49) DPDP (13) DPDPA (14) Encryption (16) endpoint security (110) Enterprise security (18) Exploit (13) GDPR (13) malware (76) malware analysis (13) malware attack (23) malware attacks (12) MDM (27) Microsoft (15) Network security (24) Patch Management (12) phishing (29) Ransomware (69) ransomware attack (30) ransomware attacks (30) ransomware protection (14) Seqrite (40) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) Threat Intelligence (13) UTM (34) Vulnerability (16) zero trust (13)
Loading
Blogs on Information Technology, Network & Cybersecurity | Seqrite

Leading enterprise IT security solutions provider simplifying endpoint, data, and network security with best-in-class threat prevention, detection, and response solutions worldwide.

Read More

Follow us:

Subscribe To Our Newsletter

Stay informed about the latest cybersecurity trends and insights.

Loading
Products & Services
  • Cloud
  • Endpoint Protection
  • Endpoint Detection and Response
  • Mobile Device Management
  • BYOD
  • Extended Detection and Response
  • Zero Trust Network Access
  • Data Privacy
  • On Prem
  • Endpoint Protection
  • Endpoint Detection and Response
  • Data Privacy
  • Platform
  • Malware Analysis Platform
  • Micro Business
  • SOHO Total Edition
  • Services
  • Threat Intel
  • Digital Risk Protection Services (DRPS)
  • Ransomware Recovery as a Services (RRaaS)
  • DPDP Compliance
  • Managed Detection and Response
Resources
  • Blogs
  • Whitepapers
  • Datasheets
  • Threat Reports
  • Manuals
  • Policy & Compliance
  • EULA
  • PoV
  • GoDeep.AI
Contact Us
  • Registered Offices
  • Nearest Offices
  • Let’s Talk Cybersecurity
Support
  • Technical Support
  • Download Software
  • Offline Updater
  • Firmware Upgrades
  • Upgrades
  • Product Documentation
About Us
  • About Seqrite
  • Leadership
  • Awards & Recognition
  • Newsroom
Partner
  • Partner Program
  • Locate Partner
  • Become A Partner
  • Seqrite Certification

© 2026 Quick Heal Technologies Ltd. Cookie Policies Privacy Policies