• News
  • Security
  • Products
  • About Seqrite
Blogs on Information Technology, Network & Cybersecurity | Seqrite Blog
  • News
  • Security
  • Products
  • About Seqrite

Information Technology, Network Security & Cybersecurity Updates

CVE-2018-8174 – Windows VBScript Engine Remote Code Execution Vulnerability

CVE-2018-8174 – Windows VBScript Engine Remote Code Execution Vulnerability

Estimated reading time: < 1 minute

The recent zero-day vulnerability in Windows VBScript Engine (CVE-2018-8174), enables attackers to perform a remote code execution on targeted machines. Microsoft has released a security advisory CVE-2018-8174 on May 8, 2018, to address this issue. According to Microsoft, it impacts most of the Windows...
Read Blog
May 10, 2018

How cybersecurity laws play an important role in securing your organization

How cybersecurity laws play an important role in securing your organization

Estimated reading time: 3 minutes

The role of digital technology is only increasing in today’s day and age. From big governments to even bigger corporations, much of the business around the world occurs on the digital highway. This kind of hyperconnectivity is common nowadays,...
Read Blog
May 10, 2018
9
Shares

Poor network visibility: Don’t put your enterprise’s security at risk

Poor network visibility: Don’t put your enterprise’s security at risk

Estimated reading time: 3 minutes

This is a world that is connected. Whether is the Internet of Things (IoT) or BYOD (Bring Your Own Device), enterprise networks do not exist in silos anymore. The number of devices that connect to enterprise networks is exponentially...
Read Blog
May 9, 2018
5
Shares

5 Cybersecurity Myths for Linux Users

5 Cybersecurity Myths for Linux Users

Estimated reading time: 3 minutes

When we talk about operating systems, the immediate names that come to mind are Microsoft Windows and Apple Macintosh. Yet, while they may be two of the most well-known operating systems around, there is also quite a portion of...
Read Blog
May 8, 2018
7
Shares

An analysis of the Dharma ransomware outbreak by Quick Heal Security Labs

An analysis of the Dharma ransomware outbreak by Quick Heal Security Labs

Estimated reading time: 6 minutes

On April 25, 2018, Quick Heal Security Labs issued an advisory on a new ransomware outbreak. We are observing a sudden spike of Dharma Ransomware. Even though Dharma ransomware is old, we observed its new variant which is encrypting...
Read Blog
May 2, 2018

The Human Factor: Keeping Your Cybersecurity Defence Strong and Secure

The Human Factor: Keeping Your Cybersecurity Defence Strong and Secure

Estimated reading time: 3 minutes

Technology is definitely getting hi-tech. But one thing which still remains decidedly rooted is plain and simple human frailty. And in the cybersecurity-obsessed war that organizations and individuals are fighting on a day-to-day basis, human errors can often prove...
Read Blog
May 2, 2018
8
Shares

Spotted unusual activity on network: Here’s what to do next

Spotted unusual activity on network: Here’s what to do next

Estimated reading time: 3 minutes

Efficient cybersecurity relies on one major commandment: prevention. Just like the physical world, prevention is better than cure and in the case of the cyber world, having the proper defence in place goes a long way in securing an...
Read Blog
April 27, 2018
2
Shares

Here’s the checklist of an efficient endpoint security solution

Here’s the checklist of an efficient endpoint security solution

Estimated reading time: 3 minutes

For any organization, big or small, endpoint security acts as a frontline against cyber attacks. Ultimately, endpoints refer to every device that is connected to the enterprise network. Most attacks on an organization can be traced back to devices...
Read Blog
April 25, 2018
4
Shares

Ransomware Alert! Follow these steps to secure your system against an ongoing ransomware attack

Ransomware Alert! Follow these steps to secure your system against an ongoing ransomware attack

Estimated reading time: 4 minutes

Quick Heal has detected an ongoing ransomware attack. This post outlines the important steps you must take to protect your computer(s) against this threat. What to do to stay safe from the attack? Most of the steps mentioned below...
Read Blog
April 25, 2018
11
Shares

What is ‘fileless malware’ and why it could be the biggest threat to your business?

What is ‘fileless malware’ and why it could be the biggest threat to your business?

Estimated reading time: 2 minutes

What is a fileless malware? First, let’s understand how a traditional antivirus works: During a malware attack, a malicious executable file or a script is placed on the computer’s hard drive. The antivirus gets into action and analyzes this...
Read Blog
April 24, 2018
3
Shares
1
← Previous 1 … 41 42 43 … 72 Next →
Featured Authors
  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director of Quick Heal Technologies...

    Read more..
  • Mahua Chakrabarthy
    Mahua Chakrabarthy

    A tea connoisseur who firmly believes that life is too short for dull content....

    Read more..
Topics
apt (19) Cyber-attack (35) cyber-attacks (58) cyberattack (16) cyberattacks (13) Cybersecurity (319) cyber security (30) Cyber threat (33) cyber threats (48) Data (11) data breach (55) data breaches (28) data loss (28) data loss prevention (34) data protection (24) data security (15) DLP (49) Encryption (16) endpoint security (106) Enterprise security (17) Exploit (14) firewall (11) GDPR (12) hackers (11) IoT (10) malware (76) malware attack (23) malware attacks (12) MDM (25) Microsoft (15) Network security (22) Patch Management (12) phishing (27) Ransomware (67) ransomware attack (30) ransomware attacks (30) ransomware protection (13) security (11) Seqrite (33) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (16) windows (11)
Loading
Resources
  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies
About Us
  • About Seqrite
  • Leadership
  • Awards & Certifications
  • Newsroom
Archives
  • By Date
  • By Category
Loading

© 2025 Quick Heal Technologies Ltd. Cookie Policies Privacy Policies