• News
  • Security
  • Products
  • About Seqrite
Blogs on Information Technology, Network & Cybersecurity | Seqrite Blog
  • News
  • Security
  • Products
  • About Seqrite

Information Technology, Network Security & Cybersecurity Updates

What is SASE and how does it reinforce network security?

What is SASE and how does it reinforce network security?

Estimated reading time: 2 minutes

Secure Access Service Edge (SASE, commonly pronounced as “sassy”) is an emerging new cybersecurity concept that was coined by global research leaders Gartner in 2019. It refers to a new offering that simplifies Wide Area Networking (WAN) and enterprise...
Read Blog
May 13, 2020

Transparent Tribe Targeting Critical Indian Organizations

Transparent Tribe Targeting Critical Indian Organizations

Estimated reading time: 5 minutes

Quick Heal Labs have been tracking this Cyber-espionage operation since 2016. We have identified this attack as operation m_project. From the past year, we have seen a surge in these APT activities. Modus operandi of the attackers have remained...
Read Blog
May 12, 2020

Coronavirus-themed Campaign delivers Agent Tesla Malware

Coronavirus-themed Campaign delivers Agent Tesla Malware

Estimated reading time: 6 minutes

While the whole world fights against the COVID-19 pandemic, cybercriminals are busy exploiting the situation and attacking vulnerable users & businesses. In the last few weeks, there has been a rise in coronavirus-themed malspams, which are being used to...
Read Blog
May 12, 2020

Java RAT Campaign Targets Co-Operative Banks in India

Java RAT Campaign Targets Co-Operative Banks in India

Estimated reading time: 8 minutes

Summary While the entire world is busy fighting COVID-19 pandemic, cybercriminals have latched onto the opportunity and used the theme to propagate numerous cyber-attacks. The latest in line is a targeted attack against co-operative banks in India. In April...
Read Blog
May 12, 2020

How safe it is to use the Zoom video-conferencing app?

How safe it is to use the Zoom video-conferencing app?

Estimated reading time: 3 minutes

Recently the Union home ministry has issued a warning raising a red flag for users of Zoom video-conferencing application and marked it as unsafe to use. Earlier, during the end of March, CERT-IN, India’s nodal cybersecurity agency had warned...
Read Blog
April 17, 2020

Is the Coronavirus also indirectly endangering your enterprise data?

Is the Coronavirus also indirectly endangering your enterprise data?

Estimated reading time: 5 minutes

The threat is real! The WHO has recently announced that the Coronavirus catastrophe has reached a a pandemic level. Amidst the global chaos, enterprises are in helter-skelter as well, thinking of the best possible ways to retain business continuity...
Read Blog
March 26, 2020

Quick Heal Technologies pledges to safeguard their enterprise customers in the testing times of the Novel Coronavirus

Quick Heal Technologies pledges to safeguard their enterprise customers in the testing times of the Novel Coronavirus

Estimated reading time: 2 minutes

As the novel Coronavirus continues to aggravate throughout the globe, we thought of taking the time out to diligently write to our customers and channel partners that our capabilities to protect you have stayed intact. The majority of our...
Read Blog
March 20, 2020

Defending businesses from the perils of Cryptojacking

Defending businesses from the perils of Cryptojacking

Estimated reading time: 2 minutes

The last few years have given rise to a new & dangerous cyberthreat known as cryptojacking which is unlike typical malware — it does not demand ransom, spy or cripple enterprise systems or cause loss of data. We introduced...
Read Blog
January 6, 2020

Managing cybersecurity in multimedia networks

Managing cybersecurity in multimedia networks

Estimated reading time: 2 minutes

The explosion of internet speeds across the globe has led to a rapid increase in high-end streaming technology, wireless sensor networks and wearable Internet of Things (IoT) devices. Multimedia networks generate huge amounts of data flowing through multiple devices...
Read Blog
December 30, 2019

How can blockchain enable better data security for enterprises?

How can blockchain enable better data security for enterprises?

Estimated reading time: 2 minutes

NASA recently announced a proposal to explore the possibility of using blockchain to improve the cybersecurity of its current air traffic management systems. It was a powerful statement from one of the world’s most well-known organizations and a strong...
Read Blog
December 27, 2019
← Previous 1 … 20 21 22 … 72 Next →
Featured Authors
  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director of Quick Heal Technologies...

    Read more..
  • Mahua Chakrabarthy
    Mahua Chakrabarthy

    A tea connoisseur who firmly believes that life is too short for dull content....

    Read more..
Topics
apt (19) Cyber-attack (35) cyber-attacks (58) cyberattack (16) cyberattacks (13) Cybersecurity (319) cyber security (30) Cyber threat (33) cyber threats (48) Data (11) data breach (55) data breaches (28) data loss (28) data loss prevention (34) data protection (24) data security (15) DLP (49) Encryption (16) endpoint security (106) Enterprise security (17) Exploit (14) firewall (11) GDPR (12) hackers (11) IoT (10) malware (76) malware attack (23) malware attacks (12) MDM (25) Microsoft (15) Network security (22) Patch Management (12) phishing (27) Ransomware (67) ransomware attack (30) ransomware attacks (30) ransomware protection (13) security (11) Seqrite (33) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (16) windows (11)
Loading
Resources
  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies
About Us
  • About Seqrite
  • Leadership
  • Awards & Certifications
  • Newsroom
Archives
  • By Date
  • By Category
Loading

© 2025 Quick Heal Technologies Ltd. Cookie Policies Privacy Policies