• News
  • Security
  • Products
  • About Seqrite
Blogs on Information Technology, Network & Cybersecurity | Seqrite Blog
  • News
  • Security
  • Products
  • About Seqrite

Information Technology, Network Security & Cybersecurity Updates

SVC New Stealer on the Horizon

SVC New Stealer on the Horizon

Estimated reading time: 5 minutes

SvcStealer 2025 is a new strain of information stealers, which is delivered through spear phishing email attachments. We observed SvcStealer malware campaign activity at the end of January 2025. This malware author harvests sensitive data such as machine data,...
Read Blog
March 21, 2025

QR Code Phishing (Quishing) Attacks: How to Spot & Prevent Them

QR Code Phishing (Quishing) Attacks: How to Spot & Prevent Them

Estimated reading time: 6 minutes

The Rising Threat of QR Code-Driven Phishing Schemes A new kind of cyberattack has emerged in recent years as a result of QR codes’ popularity as a quick and easy way to share information. Businesses are increasingly at risk...
Read Blog
March 18, 2025

Data Breach Penalties Under the DPDPA: What Businesses Need to Know

Data Breach Penalties Under the DPDPA: What Businesses Need to Know

Estimated reading time: 3 minutes

With the increasing digitization of business operations, data privacy regulations have become more stringent worldwide. In India, the Digital Personal Data Protection Act (DPDPA) sets comprehensive guidelines for handling personal data, including strict penalties for non-compliance and data breaches....
Read Blog
March 18, 2025

New Steganographic Campaign Distributing Multiple Malware

New Steganographic Campaign Distributing Multiple Malware

Estimated reading time: 7 minutes

New Steganographic Campaign Distributing Multiple Malware Recently we have observed multiple stealer malware such as Remcos, DcRAT,AgentTesla, VIPKeyLogger, etc. distributed through a steganographic campaign.  On tracing the roots, the campaign has been around for a while but has not...
Read Blog
March 17, 2025

Beyond Passwords: Is Your System Truly Secure?

Beyond Passwords: Is Your System Truly Secure?

Estimated reading time: 3 minutes

Beyond Passwords: Is Your System Truly Secure? The cybersecurity landscape is constantly evolving, with traditional methods of securing user accounts—such as passwords—proving increasingly inadequate against the growing sophistication of cyberattacks. In response, authentication systems that go Beyond Passwords, i.e.,...
Read Blog
March 12, 2025

Ransomware Attack Over Publicly Shared SMB2 Connections and Staying Protected with Seqrite

Ransomware Attack Over Publicly Shared SMB2 Connections and Staying Protected with Seqrite

Estimated reading time: 3 minutes

Ransomware Attack Over Publicly Shared SMB2 Connections and Staying Protected with Seqrite Ransomware continues to evolve as one of the most devastating cybersecurity threats, and attackers are finding new ways to exploit vulnerabilities. One such method involves targeting publicly...
Read Blog
March 11, 2025

How Attackers Exploit BitLocker: Turning Legitimate Tools into Ransomware Weapons

How Attackers Exploit BitLocker: Turning Legitimate Tools into Ransomware Weapons

Estimated reading time: 3 minutes

How Attackers Exploit BitLocker: Turning Legitimate Tools into Ransomware Weapons Introduction The ransomware landscape is evolving rapidly, with attackers constantly refining their techniques to outwit security defenses. One alarming trend is the weaponization of trusted tools like Microsoft’s BitLocker....
Read Blog
March 11, 2025

Unmasking GrassCall Campaign: The Hackers Behind Job Recruitment Cyber Scams

Unmasking GrassCall Campaign: The Hackers Behind Job Recruitment Cyber Scams

Estimated reading time: 5 minutes

Unmasking GrassCall Campaign: The Hackers Behind Job Recruitment Cyber Scams The “GrassCall” malware campaign represents an advanced social engineering attack carried out by a Russian-speaking cyber-criminal organization referred to as “Crazy Evil,” with its subgroup “kevland” leading the operation....
Read Blog
March 6, 2025

Digital Arrest Scam in India: How Cyber Criminals Exploit Fear to Deceive Victims

Digital Arrest Scam in India:  How Cyber Criminals Exploit Fear to Deceive Victims

Estimated reading time: 3 minutes

Cyber criminals in India are constantly evolving their tactics to exploit fear and trust. One alarming trend is the “Digital Arrest Scam,” where fraudsters impersonate law enforcement agencies or government officials to extort money or sensitive information. These scams...
Read Blog
February 28, 2025

Phishing 2.0: New Techniques Cybercriminals Use to Trick Victims

Phishing 2.0: New Techniques Cybercriminals Use to Trick Victims

Estimated reading time: 3 minutes

Phishing has drastically transformed from its early days as a simple scam targeting unwary email users. Modern phishing techniques—dubbed “Phishing 2.0″—are more complex, highly tailored, and designed to bypass even the most robust security systems. In this blog, we’ll...
Read Blog
February 28, 2025
← Previous 1 2 3 4 … 73 Next →
Featured Authors
  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director of Quick Heal Technologies...

    Read more..
  • Mahua Chakrabarthy
    Mahua Chakrabarthy

    A tea connoisseur who firmly believes that life is too short for dull content....

    Read more..
Topics
apt (19) Cyber-attack (35) cyber-attacks (58) cyberattack (16) cyberattacks (13) Cybersecurity (322) cyber security (30) Cyber threat (33) cyber threats (48) Data (11) data breach (55) data breaches (28) data loss (28) data loss prevention (34) data privacy (11) data protection (24) data security (15) DLP (49) Encryption (16) endpoint security (106) Enterprise security (17) Exploit (14) firewall (11) GDPR (12) hackers (11) malware (76) malware attack (23) malware attacks (12) MDM (25) Microsoft (15) Network security (22) Patch Management (12) phishing (27) Ransomware (67) ransomware attack (30) ransomware attacks (30) ransomware protection (13) security (11) Seqrite (33) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (16) windows (11)
Loading
Resources
  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies
About Us
  • About Seqrite
  • Leadership
  • Awards & Certifications
  • Newsroom
Archives
  • By Date
  • By Category
Loading

© 2025 Quick Heal Technologies Ltd. Cookie Policies Privacy Policies