• News
  • Security
  • Products
  • About Seqrite
Blogs on Information Technology, Network & Cybersecurity | Seqrite Blog
  • News
  • Security
  • Products
  • About Seqrite

Information Technology, Network Security & Cybersecurity Updates

Become a leader in creating cyber trust with Seqrite Endpoint Security

Become a leader in creating cyber trust with Seqrite Endpoint Security

Estimated reading time: 3 minutes

Enterprises, big and small, all over the world, are waking up to the importance of garnering cyber trust. In a digital age where technology only breaches new frontiers, cyber trust has become a key differentiator. Security breaches are not...
Read Blog
January 24, 2018
17
Shares

What is the right time to audit your cybersecurity program?

What is the right time to audit your cybersecurity program?

Estimated reading time: 4 minutes

In November 2017, Forever 21, a Los Angeles based clothing retailer, announced that a potential data breach might have affected some of its customers. On investigating, they found that the “encryption and tokenization solution” implemented in 2015 might not...
Read Blog
January 23, 2018
14
Shares

In-browser Cryptojacking at full throttle!

In-browser Cryptojacking at full throttle!

Estimated reading time: 3 minutes

Cryptocurrencies like Bitcoin, Monero, Ethereum, Litecoin, and Tezos are in full swing. And they have exponentially increased cryptocurrency mining (or cryptomining) activities. Previously, cryptomining was carried out by powerful and dedicated mining hardware or by utilizing distributed computing because the entire process requires a lot of computation. However, there has been an observable change in the mining trends. Now,...
Read Blog
January 23, 2018
5
Shares

Endpoint Security: Things to consider before choosing the right one

Endpoint Security: Things to consider before choosing the right one

Estimated reading time: 3 minutes

The term endpoint security refers to protecting endpoints such as desktops and laptops connected to the enterprise network. Endpoint security happens to be the front line in the battle against cyber-attacks because every device that connects to a corporate network...
Read Blog
January 18, 2018

Beware of fake cryptocurrency mining apps – a report by Quick Heal Security Labs

Beware of fake cryptocurrency mining apps – a report by Quick Heal Security Labs

Estimated reading time: 4 minutes

Cryptocurrency has become a famous and valuable digital asset. One of the ways to earn cryptocurrencies is to mine them. New coins are generated and brought into the market through the process of mining. Mining of cryptocurrency is a...
Read Blog
January 18, 2018
6
Shares

What is Disaster Recovery as a Service (DRaaS)?

What is Disaster Recovery as a Service (DRaaS)?

Estimated reading time: 3 minutes

Disasters, whether they are natural or man-made, can strike anytime without any kind of due notice. Any business, small or big, will need to anticipate the possibility of such disasters and have a plan in place. While one tactic...
Read Blog
January 17, 2018
12
Shares

Why Centralized Administration is an Important Security Tool?

Why Centralized Administration is an Important Security Tool?

Estimated reading time: 3 minutes

Today’s cyber threat landscape spreads across endpoints, servers, web, networks and emails. Not just that, with the excessive adoption of cloud technologies, the threat multiplies to on-premise and cloud too. Thus, making it a mammoth task for security administrators...
Read Blog
January 16, 2018

Seqrite thwarts attempts of a JAVA jRAT phishing campaign targeting an international embassy in India

Seqrite thwarts attempts of a JAVA jRAT phishing campaign targeting an international embassy in India

Estimated reading time: 3 minutes

Earlier we had blogged about how JAVA based jRAT malware were evolved in the recent times. At Quick Heal Security Labs, we are actively observing jRAT campaigns happening in the wild. These JAVA malware spread through phishing campaigns. While analyzing one such phishing campaign, we found...
Read Blog
January 16, 2018
4
Shares

6 Hidden IT risks in 2018

6 Hidden IT risks in 2018

Estimated reading time: 3 minutes

Dangers can often lie within. This is an information age where data is gold and in this day and age, no matter what business you are in, your Information Technology department is often your greatest asset. 2017, the year...
Read Blog
January 12, 2018
15
Shares

Virus Infectors – a perpetual attack vector!

Virus Infectors – a perpetual attack vector!

Estimated reading time: 5 minutes

2017 was the year of ransomware and cryptocurrency miners but we are still seeing infectors posing a prominent attack vector. However, old infectors still remain a significant threat to users. In 2017, we observed a few old infector families...
Read Blog
January 12, 2018
3
Shares
← Previous 1 … 48 49 50 … 72 Next →
Featured Authors
  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director of Quick Heal Technologies...

    Read more..
  • Mahua Chakrabarthy
    Mahua Chakrabarthy

    A tea connoisseur who firmly believes that life is too short for dull content....

    Read more..
Topics
apt (19) Cyber-attack (35) cyber-attacks (58) cyberattack (16) cyberattacks (13) Cybersecurity (319) cyber security (30) Cyber threat (33) cyber threats (48) Data (11) data breach (55) data breaches (28) data loss (28) data loss prevention (34) data protection (24) data security (15) DLP (49) Encryption (16) endpoint security (106) Enterprise security (17) Exploit (14) firewall (11) GDPR (12) hackers (11) IoT (10) malware (76) malware attack (23) malware attacks (12) MDM (25) Microsoft (15) Network security (22) Patch Management (12) phishing (27) Ransomware (67) ransomware attack (30) ransomware attacks (30) ransomware protection (13) security (11) Seqrite (33) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (16) windows (11)
Loading
Resources
  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies
About Us
  • About Seqrite
  • Leadership
  • Awards & Certifications
  • Newsroom
Archives
  • By Date
  • By Category
Loading

© 2025 Quick Heal Technologies Ltd. Cookie Policies Privacy Policies