• News
  • Security
  • Products
  • About Seqrite
Blogs on Information Technology, Network & Cybersecurity | Seqrite Blog
  • News
  • Security
  • Products
  • About Seqrite

Information Technology, Network Security & Cybersecurity Updates

Blockchain: A brief introduction

Blockchain: A brief introduction

Estimated reading time: 3 minutes

Cryptocurrency is not just a fad anymore – it is a reality. Almost every day, there’s a new headline about Bitcoin and its recent surge or fall. And many of these articles use terms which might sound alien. One...
Read Blog
June 15, 2018

Using data governance and compliance to your advantage

Using data governance and compliance to your advantage

Estimated reading time: 3 minutes

Data is an asset. In this day and age, it is an incredibly valuable asset. Companies value their assets, and hence they should value data as well. Yet, the number of organizations which still do not give data its...
Read Blog
June 11, 2018
2
Shares

CVE-2018-5002 – Adobe Flash Player Stack Buffer Overflow Vulnerability Alert!

CVE-2018-5002 – Adobe Flash Player Stack Buffer Overflow Vulnerability Alert!

Estimated reading time: < 1 minute

The recent zero-day vulnerability CVE-2018-5002 in Adobe Flash Player enables attackers to perform a Remote Code Execution on targeted machines. Adobe has released a security advisory APSB18-19 on June 7, 2018 to address this issue. According to Adobe, the...
Read Blog
June 8, 2018

Seqrite helps Government bodies strengthen their defense

Seqrite helps Government bodies strengthen their defense

Estimated reading time: 3 minutes

If there is one type of organization which is a favorite of cyber criminals worldwide, it is government institutions. The reasons for that are obvious: most governments, whether at the state or the federal level, are massive behemoths with...
Read Blog
June 6, 2018

How to identify, prevent and recover from cryptojacking attacks

How to identify, prevent and recover from cryptojacking attacks

Estimated reading time: 3 minutes

Cryptojacking is the dangerous new threat that threatens to cause more headaches to corporate and network administrators the world over. In a way, this was a threat that was coming – the widespread popularity of cryptocurrency was a marker...
Read Blog
June 4, 2018
1
Share

How hackers use spam to maximize the impact of a cyber attack?

How hackers use spam to maximize the impact of a cyber attack?

Estimated reading time: 3 minutes

All users of the Internet are familiar with the word ‘spam.’ ‘Spam’ is unsolicited email sent in massive quantities simultaneously to numerous users, generally trying to advertise or publicize certain products or services. This junk mail is also often used as...
Read Blog
May 28, 2018
7
Shares

GDPR has arrived: Check your preparedness

GDPR has arrived: Check your preparedness

Estimated reading time: 3 minutes

25th May 2018, the day has arrived when the EU’s General Data Protection Regulation (GDPR) has come into effect. The GDPR, a high-profile and wide-ranging piece of legislation which will, no doubt, completely reshape the world of cybersecurity and data privacy. Passed by the...
Read Blog
May 25, 2018
6
Shares

Cost of security vs. Cost of cyber attack: Which one should you choose?

Cost of security vs. Cost of cyber attack: Which one should you choose?

Estimated reading time: 3 minutes

As the number and nature of cyber threats grows increasingly day by day, organizations have opened up to the threat caused by cyber attacks. The North Atlantic Treaty Organization, which is better known as NATO, recognized cyberspace as a...
Read Blog
May 24, 2018
10
Shares

5 Critical corporate cybersecurity risks for SMBs

5 Critical corporate cybersecurity risks for SMBs

Estimated reading time: 3 minutes

A major issue which plagues small and medium businesses (SMBs) when it comes to cybersecurity is their own perception. Often, SMBs suffer from a notion that they are not as important, that they do need to worry about fixing...
Read Blog
May 21, 2018

CVE-2018-4990 – Adobe Reader Double Free (Zero Day) vulnerability alert!

CVE-2018-4990 – Adobe Reader Double Free (Zero Day) vulnerability alert!

Estimated reading time: < 1 minute

The recent zero-day vulnerability CVE-2018-4990 in Adobe Reader enables attackers to perform a Remote Code Execution on targeted machines. Adobe has released a security advisory APSB18-09 on May 14, 2018 to address this issue. According to Adobe, the in-wild...
Read Blog
May 16, 2018
← Previous 1 … 40 41 42 … 72 Next →
Featured Authors
  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director of Quick Heal Technologies...

    Read more..
  • Mahua Chakrabarthy
    Mahua Chakrabarthy

    A tea connoisseur who firmly believes that life is too short for dull content....

    Read more..
Topics
apt (19) Cyber-attack (35) cyber-attacks (58) cyberattack (16) cyberattacks (13) Cybersecurity (321) cyber security (30) Cyber threat (33) cyber threats (48) Data (11) data breach (55) data breaches (28) data loss (28) data loss prevention (34) data protection (24) data security (15) DLP (49) Encryption (16) endpoint security (106) Enterprise security (17) Exploit (14) firewall (11) GDPR (12) hackers (11) IoT (10) malware (76) malware attack (23) malware attacks (12) MDM (25) Microsoft (15) Network security (22) Patch Management (12) phishing (27) Ransomware (67) ransomware attack (30) ransomware attacks (30) ransomware protection (13) security (11) Seqrite (33) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (16) windows (11)
Loading
Resources
  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies
About Us
  • About Seqrite
  • Leadership
  • Awards & Certifications
  • Newsroom
Archives
  • By Date
  • By Category
Loading

© 2025 Quick Heal Technologies Ltd. Cookie Policies Privacy Policies