• News
  • Security
  • Products
  • About Seqrite
Blogs on Information Technology, Network & Cybersecurity | Seqrite Blog
  • News
  • Security
  • Products
  • About Seqrite

Information Technology, Network Security & Cybersecurity Updates

Unmasking Cronus: How Fake PayPal Documents Deliver Fileless Ransomware via PowerShell

Unmasking Cronus: How Fake PayPal Documents Deliver Fileless Ransomware via PowerShell

Estimated reading time: 8 minutes

Seqrite Labs APT-Team has recently discovered multiple campaigns involving fake PayPal lures. These are targeting individuals around the globe with a new variant of ransomware known as Cronus. In this case, the malware is developed in PowerShell and is...
Read Blog
August 6, 2024

What Can Be The Estimate Losses Caused By The Recent IT Outage Caused By Faulty CrowdStrike Update?

What Can Be The Estimate Losses Caused By The Recent IT Outage Caused By Faulty CrowdStrike Update?

Estimated reading time: 3 minutes

Cyberattacks using computer viruses or malware have been costing billions of dollars each year in cleanup and repair costs. Having been in this industry for almost three decades, I still recall some of the most notable and devastating computer...
Read Blog
July 30, 2024

Umbrella of Pakistani Threats: Converging Tactics of Cyber-operations Targeting India

Umbrella of Pakistani Threats: Converging Tactics of Cyber-operations Targeting India

Estimated reading time: 16 minutes

An open directory hosting malware linked to Transparent Tribe (APT36) has been found by SEQRITE Labs APT team. Further analysis revealed hidden URLs on the same domain containing payloads used by its sub-division APT group SideCopy. Targeting of Indian...
Read Blog
July 25, 2024

How to Avoid Falling for Fake Emails like “You Have Been Under Surveillance”

How to Avoid Falling for Fake Emails like “You Have Been Under Surveillance”

Estimated reading time: 3 minutes

How to Avoid Falling for Fake Emails like “You Have Been Under Surveillance” A recent email scam titled “You Have Been Under Surveillance” is a classic example of a sextortion scam. These scams involve cybercriminals threatening to expose sensitive...
Read Blog
July 4, 2024

How AI is Changing the Go-to-Market Strategy of Cyber Criminals

How AI is Changing the Go-to-Market Strategy of Cyber Criminals

Estimated reading time: 3 minutes

How AI is Changing the Go-to-Market Strategy of Cyber Criminals Just like any other business, cybercriminals run their syndicate with the sole aim of maximizing profits. With that in mind, let us decipher the role of AI in cybercrime...
Read Blog
June 27, 2024

Strengthening Indian SMEs: Essential Cybersecurity Practices to Avert Rising Cyberattacks

Strengthening Indian SMEs: Essential Cybersecurity Practices to Avert Rising Cyberattacks

Estimated reading time: 2 minutes

Indian small and medium enterprises (SMEs) have been in the bull’s eye for cyberattacks lately. According to a recent study by the CyberPeace Foundation, approximately 43% of all cyberattacks target the country’s small businesses and startups. The most evident...
Read Blog
June 21, 2024

10 Reasons Why CISOs Must Leverage XDR For Enterprise Security

10 Reasons Why CISOs Must Leverage XDR For Enterprise Security

Estimated reading time: 3 minutes

10 Reasons Why CISOs Must Leverage XDR For Enterprise Security Today enterprises face an ever-growing array of sophisticated threats that demand a comprehensive and proactive defense strategy.  In the face of these growing cyber threats, CISOs are overwhelmed with...
Read Blog
June 19, 2024

Unmasking AsukaStealer: The $80 Malware Threatening Your Digital Security

Unmasking AsukaStealer: The $80 Malware Threatening Your Digital Security

Estimated reading time: 4 minutes

AsukaStealer, marketed on a Russian-language cybercrime forum by the alias ‘breakcore,’ has been exposed. The perpetrator offers its services for a monthly fee of $80, targeting individuals and organizations seeking to exploit its capabilities for malicious purposes. Written in...
Read Blog
May 30, 2024

Why Endpoint Detection and Response (EDR) Is The Future of Endpoint Protection?

Why Endpoint Detection and Response (EDR) Is The Future of Endpoint Protection?

Estimated reading time: 5 minutes

Why Endpoint Detection and Response (EDR) Is The Future of Endpoint Protection?  Studies show that nearly 90% of cyberattacks and 70% of data breaches start at endpoint devices. Traditional security solutions like antivirus and firewalls are limited to detecting...
Read Blog
May 27, 2024

Why 60% of enterprises are moving from VPNs to Zero Trust Network Access?

Why 60% of enterprises are moving from VPNs to Zero Trust Network Access?

Estimated reading time: 4 minutes

Why 60% of enterprises are moving from VPNs to Zero Trust Network Access ? In today’s rapidly evolving digital landscape, organizations are grappling with the challenges posed by remote and hybrid work models. As the traditional enterprise perimeter continues...
Read Blog
May 22, 2024
← Previous 1 … 5 6 7 … 72 Next →
Featured Authors
  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director of Quick Heal Technologies...

    Read more..
  • Mahua Chakrabarthy
    Mahua Chakrabarthy

    A tea connoisseur who firmly believes that life is too short for dull content....

    Read more..
Topics
apt (19) Cyber-attack (35) cyber-attacks (58) cyberattack (16) cyberattacks (13) Cybersecurity (319) cyber security (30) Cyber threat (33) cyber threats (48) Data (11) data breach (55) data breaches (28) data loss (28) data loss prevention (34) data protection (24) data security (15) DLP (49) Encryption (16) endpoint security (106) Enterprise security (17) Exploit (14) firewall (11) GDPR (12) hackers (11) IoT (10) malware (76) malware attack (23) malware attacks (12) MDM (25) Microsoft (15) Network security (22) Patch Management (12) phishing (27) Ransomware (67) ransomware attack (30) ransomware attacks (30) ransomware protection (13) security (11) Seqrite (33) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (16) windows (11)
Loading
Resources
  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies
About Us
  • About Seqrite
  • Leadership
  • Awards & Certifications
  • Newsroom
Archives
  • By Date
  • By Category
Loading

© 2025 Quick Heal Technologies Ltd. Cookie Policies Privacy Policies