• News
  • Security
  • Products
  • About Seqrite
Blogs on Information Technology, Network & Cybersecurity | Seqrite Blog
  • News
  • Security
  • Products
  • About Seqrite

Information Technology, Network Security & Cybersecurity Updates

5 key takeaways from major data breaches

5 key takeaways from major data breaches

Estimated reading time: 3 minutes

Cyber-attacks, hacks or data breaches have become common in recent times. Be it large scale businesses or a startup; no one is safe from the ever-growing cyber threat landscape. While keeping track of all cyber-attacks is not possible for...
Read Blog
September 18, 2017

How is new technology bringing risk to the Government?

How is new technology bringing risk to the Government?

Estimated reading time: 3 minutes

Use of technology provides improvements in productivity, cost savings and more accurate process execution in almost all industries. This applies to both private and public sector (Government bodies). Use of technology reduces back logs, increases the speed of processes and improves overall...
Read Blog
September 15, 2017

CVE-2017-8759 – .NET Framework Remote Code Execution Vulnerability

CVE-2017-8759 – .NET Framework Remote Code Execution Vulnerability

Estimated reading time: 2 minutes

The recent zero-day vulnerability in .NET Framework vulnerability CVE-2017-8759 enables attackers to perform a Remote Code Execution on the targeted machine. This vulnerability is found to be exploited in the wild through email spam messages loaded with malicious RTF files...
Read Blog
September 14, 2017

Cybersecurity trends and predictions to watch out for in 2017

Cybersecurity trends and predictions to watch out for in 2017

Estimated reading time: 3 minutes

If 2016 was the year of data breaches, 2017 might just well take things to a whole new level; precisely when it comes to cybersecurity threats. Hackers have newer tools in their arsenal which have multiplied difficulties for organizations—...
Read Blog
September 14, 2017

Discovered data breach? What’s your strategy to manage cyber attack in the financial sector?

Discovered data breach? What’s your strategy to manage cyber attack in the financial sector?

Estimated reading time: 3 minutes

Cyber breaches are getting more and more common these days. If you are running a business, the chances are that you will be a victim of at least one breach in the lifetime of the business. The likelihood of a breach increases if...
Read Blog
September 13, 2017

5 Data breaches on Government Institutions across the globe

5 Data breaches on Government Institutions across the globe

Estimated reading time: 3 minutes

No one is safe in the world of cybernetics, not even the Government organizations. Across the world, the Government organizations are a favorite target for hackers and cyber criminals. Be it for the value of the data held by the Government or...
Read Blog
September 12, 2017

New Hacking Threats: Biometric Vulnerabilities

New Hacking Threats: Biometric Vulnerabilities

Estimated reading time: 3 minutes

Biometric authentication seems to be the authentication technology of the future. Scan the finger on the finger print scanner and payment is done for your purchase. No need to type out your card details and enter OTPs. Scan your...
Read Blog
September 11, 2017

Business security in the era of connected things

Business security in the era of connected things

Estimated reading time: 3 minutes

The world is at the cusp of 4th Industrial revolution which will be empowered by Internet of Things (IoT). This is where everything is connected to everything else using a digital network. Refrigerators, alarm clocks, air conditioners, etc. shall be connected to the Internet and be accessible over mobile...
Read Blog
September 8, 2017

Why Data Breaches should make you rethink your IT Strategy

Why Data Breaches should make you rethink your IT Strategy

Estimated reading time: 3 minutes

In this post, we give you an insight into data breach – a point-blank catastrophe that looms over most organizations. What is Data Breach? Data breach occurs when confidential data of an organization is lost or illegally obtained by...
Read Blog
September 7, 2017

CVE-2017-9805 – Apache Struts 2 Remote Code Execution Vulnerability

CVE-2017-9805 – Apache Struts 2 Remote Code Execution Vulnerability

Estimated reading time: 2 minutes

A critical remote code execution vulnerability has been discovered in famous web application framework Apache Struts, which allows attackers to execute arbitrary code. To address this issue, Apache Struts has issued a security advisory and CVE-2017-9805 has been assigned...
Read Blog
September 7, 2017
← Previous 1 … 59 60 61 … 72 Next →
Featured Authors
  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director of Quick Heal Technologies...

    Read more..
  • Mahua Chakrabarthy
    Mahua Chakrabarthy

    A tea connoisseur who firmly believes that life is too short for dull content....

    Read more..
Topics
apt (19) Cyber-attack (35) cyber-attacks (58) cyberattack (16) cyberattacks (13) Cybersecurity (321) cyber security (30) Cyber threat (33) cyber threats (48) Data (11) data breach (55) data breaches (28) data loss (28) data loss prevention (34) data privacy (11) data protection (24) data security (15) DLP (49) Encryption (16) endpoint security (106) Enterprise security (17) Exploit (14) firewall (11) GDPR (12) hackers (11) malware (76) malware attack (23) malware attacks (12) MDM (25) Microsoft (15) Network security (22) Patch Management (12) phishing (27) Ransomware (67) ransomware attack (30) ransomware attacks (30) ransomware protection (13) security (11) Seqrite (33) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (16) windows (11)
Loading
Resources
  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies
About Us
  • About Seqrite
  • Leadership
  • Awards & Certifications
  • Newsroom
Archives
  • By Date
  • By Category
Loading

© 2025 Quick Heal Technologies Ltd. Cookie Policies Privacy Policies