• News
  • Security
  • Products
  • About Seqrite
Blogs on Information Technology, Network & Cybersecurity | Seqrite Blog
  • News
  • Security
  • Products
  • About Seqrite

Information Technology, Network Security & Cybersecurity Updates

How to build a strong cloud network security strategy

How to build a strong cloud network security strategy

Estimated reading time: 2 minutes

While enterprises often focus on building strong, robust cybersecurity interfaces for their in-house networks, cybersecurity for cloud networks is a whole different ballgame. Yet, enterprises cannot avoid the advantages of doing their business on the cloud – the sheer...
Read Blog
June 10, 2019

APT-27 like Newcore RAT, Virut exploiting MySQL for targeted attacks on enterprise

APT-27 like Newcore RAT, Virut exploiting MySQL for targeted attacks on enterprise

Estimated reading time: 7 minutes

In today’s world data is everything, and to store and process this large amount of data, everyone started using computing devices. Database servers which are used for storing this precious data on computing devices include MySQL, MongoDB, MSSQL, etc....
Read Blog
May 28, 2019

Rise of cyber-physical attacks

Rise of cyber-physical attacks

Estimated reading time: 3 minutes

It was back in 2012 when the then Defense Secretary of the United States warned of the possibility of the country facing a “cyber-Pearl Harbor”. He painted a bleak possibility – that extremist groups and enemy nations would use...
Read Blog
May 27, 2019

CVE-2019-11815: Experts discovered a privilege escalation vulnerability in the Linux Kernel

Estimated reading time: 2 minutes

Red Hat engineers and experts discovered a memory corruption vulnerability in Linux kernel, which is basically a flaw while implementation of RDS (Remote desktop Protocol) over TCP. This flaw has affected Red Hat, Ubuntu, Debian and SUSE and security...
Read Blog
May 27, 2019

Seqrite Endpoint Security supports the Windows 10 May 2019 Update

Seqrite Endpoint Security supports the Windows 10 May 2019 Update

Estimated reading time: 2 minutes

As part of the Windows 10 Updates, Microsoft has now come up with a new update for Windows 10 PCs. It’s called Windows 10 19H1 (Windows 10 May 2019 Update). This post lists down some of the highlights of...
Read Blog
May 23, 2019

Cybersecurity roundup – Jan to April ‘19

Cybersecurity roundup – Jan to April ‘19

Estimated reading time: 2 minutes

2019 is not even halfway over and there is already a flurry of cyber attacks all over the globe. Network administrators and cybersecurity experts have to always be on their toes as, no one is safe from the risk...
Read Blog
May 22, 2019

What is Emotet?

What is Emotet?

Estimated reading time: 4 minutes

Emotet malware was first identified in 2014 as Banking trojan. Emotet has evolved from banking trojan to threat distributor till now. It has hit many organizations very badly in 2018 with its functionalities like spamming and spreading. Further with...
Read Blog
May 21, 2019

CVE-2019-0708 – A Critical “Wormable” Remote Code Execution Vulnerability in Windows RDP

CVE-2019-0708 – A Critical “Wormable” Remote Code Execution Vulnerability in Windows RDP

Estimated reading time: 2 minutes

This is an important security advisory related to a recently patched Critical remote code execution vulnerability in Microsoft Windows Remote Desktop Service (RDP). The vulnerability is identified as “CVE-2019-0708 – Remote Desktop Services Remote Code Execution Vulnerability”. MSRC blog mentions...
Read Blog
May 17, 2019

5 Cyber Security Best Practices For Your Small to Medium-Size Business

5 Cyber Security Best Practices For Your Small to Medium-Size Business

Estimated reading time: 2 minutes

Small to medium-sized businesses often tend to underestimate cybersecurity. The reasons range from practicality – they may not have the resources, to sheer over-confidence – the notion that they are not important enough to be at risk of cybersecurity...
Read Blog
May 9, 2019

Miners snatching open source tools to strengthen their malevolent power!

Miners snatching open source tools to strengthen their malevolent power!

Estimated reading time: 9 minutes

From the last one year, Quick Heal Security Labs has been observing a boost in the number of mining malware. One of the ways to earn cryptocurrencies is to mine them. Nowadays cryptocurrency miner malware have become hot attack...
Read Blog
April 26, 2019
← Previous 1 … 29 30 31 … 72 Next →
Featured Authors
  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director of Quick Heal Technologies...

    Read more..
  • Mahua Chakrabarthy
    Mahua Chakrabarthy

    A tea connoisseur who firmly believes that life is too short for dull content....

    Read more..
Topics
apt (19) Cyber-attack (35) cyber-attacks (58) cyberattack (16) cyberattacks (13) Cybersecurity (319) cyber security (30) Cyber threat (33) cyber threats (48) Data (11) data breach (55) data breaches (28) data loss (28) data loss prevention (34) data protection (24) data security (15) DLP (49) Encryption (16) endpoint security (106) Enterprise security (17) Exploit (14) firewall (11) GDPR (12) hackers (11) IoT (10) malware (76) malware attack (23) malware attacks (12) MDM (25) Microsoft (15) Network security (22) Patch Management (12) phishing (27) Ransomware (67) ransomware attack (30) ransomware attacks (30) ransomware protection (13) security (11) Seqrite (33) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (16) windows (11)
Loading
Resources
  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies
About Us
  • About Seqrite
  • Leadership
  • Awards & Certifications
  • Newsroom
Archives
  • By Date
  • By Category
Loading

© 2025 Quick Heal Technologies Ltd. Cookie Policies Privacy Policies