• News
  • Security
  • Products
  • About Seqrite
Blogs on Information Technology, Network & Cybersecurity | Seqrite Blog
  • News
  • Security
  • Products
  • About Seqrite

Information Technology, Network Security & Cybersecurity Updates

Emerging trend of spreading malware through IQY files

Emerging trend of spreading malware through IQY files

Estimated reading time: 4 minutes

Nowadays attackers are searching for new techniques to spread malware, recently we came across a new emerging way to deliver malware through IQY file. Till now we had seen spread of malware through various file types and chains such as...
Read Blog
October 3, 2018
13
Shares

What is a Red Team Assessment and why does RBI endorse it?

What is a Red Team Assessment and why does RBI endorse it?

Estimated reading time: 3 minutes

When it comes to cybersecurity for enterprises, one sector that finds itself at a lot of risk is the banking sector. Banks conduct financial transactions which can be worth millions in value every single day which mean they present...
Read Blog
September 25, 2018
8
Shares
1

The Big Question – Internet of Things or Internet of Threats?

The Big Question – Internet of Things or Internet of Threats?

Estimated reading time: 3 minutes

The tech world seems to be gearing up for the fourth industrial revolution with an estimated 20 billion Internet of Things devices expected to be deployed by the year 2020. While these technical marvels are being designed to streamline...
Read Blog
September 24, 2018
6
Shares

What is Business Email Compromise (BEC)?

What is Business Email Compromise (BEC)?

Estimated reading time: 3 minutes

Business Email Compromise (BEC), also known as “Man-In-The-Email” or “CEO Fraud”, is a sophisticated type of phishing attack, carried out through elaborate means and usually with devastating effect. The US’s Federal Bureau of Investigation (FBI) estimated that global business...
Read Blog
September 23, 2018
4
Shares

Rise of security risks on Mobile

Rise of security risks on Mobile

Estimated reading time: 3 minutes

According to a recent survey, the number of mobile phone users in the world is expected to pass 5 billion in 2019. That’s an incredible number of people using mobile phones. Truly, when we talk about a digital connected...
Read Blog
September 16, 2018
3
Shares

What is social engineering? How criminals take advantage of human behavior

What is social engineering? How criminals take advantage of human behavior

Estimated reading time: 3 minutes

For all the high-tech security that is employed, an organization’s biggest chink in its defense, when it comes to cybersecurity, can be its own employees. That is not to say that these employees are deliberately doing what they are,...
Read Blog
September 14, 2018
7
Shares

CVE-2018-8440 – Task Scheduler ALPC Zero-Day Exploit in the Wild

CVE-2018-8440 – Task Scheduler ALPC Zero-Day Exploit in the Wild

Estimated reading time: < 1 minute

The recent zero-day vulnerability CVE-2018-8440 in Windows Task Scheduler enables attackers to perform a privilege elevation on targeted machines. Microsoft has released a security advisory CVE-2018-8440 on September 11, 2018 to address this issue. According to Microsoft, successful exploitation...
Read Blog
September 12, 2018

How to build a zero trust network

How to build a zero trust network

Estimated reading time: 3 minutes

Traditionally, any discussion about network security is focused on a specific model that organizations have largely internalized. This model is boundary or parameter-based model and assumes of a perimeter or a boundary outside a network. By this model, cybersecurity...
Read Blog
September 6, 2018
114
Shares

Why trust Seqrite? Don’t take our word for it. Hear it from our customers

Why trust Seqrite? Don’t take our word for it. Hear it from our customers

Estimated reading time: 3 minutes

Seqrite’s range of world-class cybersecurity solutions are defined by innovation and simplicity. The solutions provided are a combination of intelligence, analysis of applications and state-of-the-art technology, and are designed to provide better protection for our customers. Backed by Quick...
Read Blog
September 5, 2018
7
Shares
1

I am invisible – Monero (XMR) Miner

I am invisible – Monero (XMR) Miner

Estimated reading time: 4 minutes

From the last one year, Quick Heal Security Labs has been observing a boost in the number of mining malware. Nowadays malware authors are using mining as a replacement for Ransomware to make money. Recently Quick Heal Security Labs...
Read Blog
September 3, 2018
← Previous 1 … 36 37 38 … 72 Next →
Featured Authors
  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director of Quick Heal Technologies...

    Read more..
  • Mahua Chakrabarthy
    Mahua Chakrabarthy

    A tea connoisseur who firmly believes that life is too short for dull content....

    Read more..
Topics
apt (19) Cyber-attack (35) cyber-attacks (58) cyberattack (16) cyberattacks (13) Cybersecurity (319) cyber security (30) Cyber threat (33) cyber threats (48) Data (11) data breach (55) data breaches (28) data loss (28) data loss prevention (34) data protection (24) data security (15) DLP (49) Encryption (16) endpoint security (106) Enterprise security (17) Exploit (14) firewall (11) GDPR (12) hackers (11) IoT (10) malware (76) malware attack (23) malware attacks (12) MDM (25) Microsoft (15) Network security (22) Patch Management (12) phishing (27) Ransomware (67) ransomware attack (30) ransomware attacks (30) ransomware protection (13) security (11) Seqrite (33) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (16) windows (11)
Loading
Resources
  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies
About Us
  • About Seqrite
  • Leadership
  • Awards & Certifications
  • Newsroom
Archives
  • By Date
  • By Category
Loading

© 2025 Quick Heal Technologies Ltd. Cookie Policies Privacy Policies