• News
  • Security
  • Products
  • About Seqrite
Blogs on Information Technology, Network & Cybersecurity | Seqrite Blog
  • News
  • Security
  • Products
  • About Seqrite

Information Technology, Network Security & Cybersecurity Updates

Holiday seasons: Breeding ground for cybercriminals

Holiday seasons: Breeding ground for cybercriminals

Estimated reading time: 3 minutes

Amidst the incessant hustle and bustle of holidays, while most organizations and consumers are busy enjoying the merrier times, cyber risks are subtly growing and getting ready to chew up on consumer experiences and company profits. Last few years...
Read Blog
December 6, 2017

An emerging trend of DDE based Office malware

An emerging trend of DDE based Office malware

Estimated reading time: 3 minutes

For the past few years, we have been seeing macro-based attacks through Object Linking Embedding (OLE)/Microsoft Office files. But, presently, attackers are using a different technique to spread malware through Office files – using a new attack vector called ‘Dynamic Data Exchange (DDE)’. DDE is an authorized Microsoft Office feature that provides several...
Read Blog
December 6, 2017
2
Shares

Unified Threat Management: Understanding the requirements as per today’s threat scenario

Unified Threat Management: Understanding the requirements as per today’s threat scenario

Estimated reading time: 3 minutes

Single security measures haven’t been successful in controlling and mitigating the lingering cybersecurity threats. This is why a majority of enterprises are slowly shifting towards multi-layered security strategies for strengthening their IT security framework. Unified Threat Management or UTM...
Read Blog
December 5, 2017
2
Shares

The Cyber Threat Landscape 2017

The Cyber Threat Landscape 2017

Estimated reading time: 3 minutes

Cyber threats are multiplying at an uncontrollable rate and 2017 hasn’t been any different. While global damages, concerning cybersecurity, are expected to surpass $5 billion by the end of this year, the actual predicament is the supposed yearly growth which...
Read Blog
December 4, 2017
2
Shares

IcedID – a new sophisticated banking Trojan: a technical analysis by Quick Heal Security Labs

IcedID – a new sophisticated banking Trojan: a technical analysis by Quick Heal Security Labs

Estimated reading time: 3 minutes

IcedID is a new player in the banking Trojan family. It has a modular architecture and capable of stealing banking credentials of the user by performing a man-in-the-middle attack (MITM). IcedID sets up a local proxy and redirects all...
Read Blog
December 1, 2017

Cybersecurity News Rundown November 2017

Cybersecurity News Rundown November 2017

Estimated reading time: 3 minutes

Welcome to our Cybersecurity News Rundown for the month of November 2017. Here, we will be sharing latest and trending news on events and technological updates from the world of cybersecurity that happened over the past month. Make sure...
Read Blog
November 30, 2017
1
Share

Preparing for GDPR? Here are some security tips you must know

Preparing for GDPR? Here are some security tips you must know

Estimated reading time: 3 minutes

The deadline for General Data Protection Regulation compliance is fast approaching, and every global organization must be well prepared for embracing this change. If an enterprise is directly or indirectly associated with the European Union, it should be mindful...
Read Blog
November 29, 2017
5
Shares

Why you need advanced information security technologies?

Why you need advanced information security technologies?

Estimated reading time: 3 minutes

Cybersecurity threats have evolved over the years, compelling industries to focus on advanced technologies that are in line with the innovative threat vectors. That said, enterprises are committed towards improving the security posture of their IT systems and in...
Read Blog
November 28, 2017

Pillars of enterprise data protection: A proactive approach

Pillars of enterprise data protection: A proactive approach

Estimated reading time: 3 minutes

Modern day data security and protection requirements aren’t only about integrity, confidentiality, and availability. Instead, security professionals must take a proactive approach for improving business value and addressing organizational security. However, talking about proactivity isn’t going to make much...
Read Blog
November 27, 2017

Cybersecurity and Compliance requirements: Part 1

Cybersecurity and Compliance requirements: Part 1

Estimated reading time: 3 minutes

Compliance, in the simplest possible terms, refers to integrating certain industrial standards based on specific requirements. While regulatory compliance can easily impose additional costs to the IT networks and security systems, the costs and repercussions for not complying with...
Read Blog
November 24, 2017
3
Shares
← Previous 1 … 52 53 54 … 72 Next →
Featured Authors
  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director of Quick Heal Technologies...

    Read more..
  • Mahua Chakrabarthy
    Mahua Chakrabarthy

    A tea connoisseur who firmly believes that life is too short for dull content....

    Read more..
Topics
apt (19) Cyber-attack (35) cyber-attacks (58) cyberattack (16) cyberattacks (13) Cybersecurity (319) cyber security (30) Cyber threat (33) cyber threats (48) Data (11) data breach (55) data breaches (28) data loss (28) data loss prevention (34) data protection (24) data security (15) DLP (49) Encryption (16) endpoint security (106) Enterprise security (17) Exploit (14) firewall (11) GDPR (12) hackers (11) IoT (10) malware (76) malware attack (23) malware attacks (12) MDM (25) Microsoft (15) Network security (22) Patch Management (12) phishing (27) Ransomware (67) ransomware attack (30) ransomware attacks (30) ransomware protection (13) security (11) Seqrite (33) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (16) windows (11)
Loading
Resources
  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies
About Us
  • About Seqrite
  • Leadership
  • Awards & Certifications
  • Newsroom
Archives
  • By Date
  • By Category
Loading

© 2025 Quick Heal Technologies Ltd. Cookie Policies Privacy Policies