• News
  • Security
  • Products
  • About Seqrite
Blogs on Information Technology, Network & Cybersecurity | Seqrite Blog
  • News
  • Security
  • Products
  • About Seqrite

Information Technology, Network Security & Cybersecurity Updates

The What, How, and Why of Data Privacy

The What, How, and Why of Data Privacy

Estimated reading time: 3 minutes

Data privacy is a cornerstone of modern business operations and consumer trust in an increasingly digital world. Every click, transaction, or interaction in the online space generates data, often containing sensitive information. Protecting this data is a regulatory requirement...
Read Blog
January 24, 2025

Unveiling Silent Lynx APT Targeting Entities Across Kyrgyzstan & Neighbouring Nations

Estimated reading time: 10 minutes

Silent Lynx APT Targets Various Entities Across Kyrgyzstan & Neighbouring Nations Contents Key Targets Industries Affected Geographical Focus Infection Chain Initial Findings Campaign 1 Looking into the malicious email Looking into decoy document. Campaign 2 Looking into the malicious...
Read Blog
January 21, 2025

Draft DPDPA Guidelines: What’s in it for Cybersecurity Leaders?

Draft DPDPA Guidelines: What’s in it for Cybersecurity Leaders?

Estimated reading time: 3 minutes

The Digital Personal Data Protection Act (DPDPA) is poised to redefine India’s cybersecurity and data protection landscape. The recent draft guidelines have sparked widespread discussions, especially among cybersecurity leaders responsible for safeguarding data and ensuring compliance. This blog explores...
Read Blog
January 10, 2025

Formbook Phishing Campaign with old Payloads

Formbook Phishing Campaign with old Payloads

Estimated reading time: 8 minutes

Recently, Seqrite Lab saw a phishing campaign delivering formbook stealers through email attachments. Formbook, as seen since 2016, has evolved in many ways from stealth features to evasion techniques. Being sold on hacking forums as Malware as a Service,...
Read Blog
January 7, 2025

5th January and The Tale of Joshi Virus: India’s First Global Computer Virus

5th January and The Tale of Joshi Virus: India’s First Global Computer Virus

Estimated reading time: 3 minutes

In the cinematic tapestry of cybersecurity, where tales of intrigue and innovation collide, one story emerges from the shadows of the past. It’s a story that began in the early 1990s, during the DOS era, when computer viruses were...
Read Blog
December 26, 2024

How To Protect Your Brand From Fake Websites and Online Impersonation

How To Protect Your Brand From Fake Websites and Online Impersonation

Estimated reading time: 3 minutes

We are observing a rise in fake websites offering investment-related services. Many of these impersonate well-known brands by creating replicas of their official websites. Unsuspecting visitors interact with these fake websites, fall victim to scams, and lose large sums...
Read Blog
December 13, 2024

XWorm: Analyzing New Infection Tactics With Old Payload

XWorm: Analyzing New Infection Tactics With Old Payload

Estimated reading time: 5 minutes

Introduction: Attackers are continuously developing different techniques to infect systems and steal sensitive information. A recent campaign a multi-stage infection chain that starts with a LNK file, which lures the victim into opening an invoice in a web browser....
Read Blog
December 4, 2024
1

Evolving Threats: The Adaptive Design of XWorm Malware

Evolving Threats: The Adaptive Design of XWorm Malware

Estimated reading time: 4 minutes

Introduction XWorm is an evasive and flexible malware recognized for its modular design. It uses obfuscation techniques to avoid detection. It communicates with a Command and Control server and executes malicious activities. After execution, the malware decrypts its configuration...
Read Blog
November 25, 2024

DPDP Compliance in Healthcare: Best Practices for Protecting Patient Information

DPDP Compliance in Healthcare: Best Practices for Protecting Patient Information

Estimated reading time: 3 minutes

The modern-day healthcare industry faces unique cybersecurity challenges. On the one hand, cutting-edge technologies and increasing digitization have helped elevate healthcare quality, yet they have also threatened the privacy and security of patient data. According to The HIPPA Journal’s...
Read Blog
November 6, 2024

Zero Trust Network Access is imperative for Cooperative Banks, Says Seqrite CPO Dr. Lalit Mohan at Banking Frontier’s Conference.

Zero Trust Network Access is imperative for Cooperative Banks, Says Seqrite CPO Dr. Lalit Mohan at Banking Frontier’s Conference.

Estimated reading time: 4 minutes

Zero Trust Network Access is imperative for Cooperative Banks, Says Seqrite CPO Dr. Lalit Mohan at Banking Frontier’s Conference.   At the recent Banking Frontier’s NCBS and FCBA Awards and Conference, Seqrite’s Chief Product Officer, Dr. Lalit Mohan Sanagavarapu,...
Read Blog
November 5, 2024
← Previous 1 … 3 4 5 … 72 Next →
Featured Authors
  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director of Quick Heal Technologies...

    Read more..
  • Mahua Chakrabarthy
    Mahua Chakrabarthy

    A tea connoisseur who firmly believes that life is too short for dull content....

    Read more..
Topics
apt (19) Cyber-attack (35) cyber-attacks (58) cyberattack (16) cyberattacks (13) Cybersecurity (319) cyber security (30) Cyber threat (33) cyber threats (48) Data (11) data breach (55) data breaches (28) data loss (28) data loss prevention (34) data protection (24) data security (15) DLP (49) Encryption (16) endpoint security (106) Enterprise security (17) Exploit (14) firewall (11) GDPR (12) hackers (11) IoT (10) malware (76) malware attack (23) malware attacks (12) MDM (25) Microsoft (15) Network security (22) Patch Management (12) phishing (27) Ransomware (67) ransomware attack (30) ransomware attacks (30) ransomware protection (13) security (11) Seqrite (33) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (16) windows (11)
Loading
Resources
  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies
About Us
  • About Seqrite
  • Leadership
  • Awards & Certifications
  • Newsroom
Archives
  • By Date
  • By Category
Loading

© 2025 Quick Heal Technologies Ltd. Cookie Policies Privacy Policies