• News
  • Security
  • Products
  • About Seqrite
Blogs on Information Technology, Network & Cybersecurity | Seqrite Blog
  • News
  • Security
  • Products
  • About Seqrite

Information Technology, Network Security & Cybersecurity Updates

A technical analysis of the recent Petya ransomware attack

A technical analysis of the recent Petya ransomware attack

Estimated reading time: 4 minutes

Earlier this week, a new variant of Petya Ransomware was spotted which was creating havoc all over Europe as well as major parts of Asia including India. The major target for Petya has been Ukraine as its major banks...
Read Blog
June 30, 2017

General Data Protection Regulation

General Data Protection Regulation

Estimated reading time: 2 minutes

Regulation is the innovation Any data protection law is mostly drafted with a certain amount of jargon and the General Data Protection Regulation (GDPR) is no different. Many of us can hear the clock tick as the European Union is set...
Read Blog
June 29, 2017

DOs and DON’Ts to stay safe from Ransomware (infographic)

DOs and DON’Ts to stay safe from Ransomware (infographic)

Estimated reading time: < 1 minute

Unless you live in a cave, you would definitely know what is a ransomware. It is a malware that is keeping Internet users awake at nights and restless during the day. It does not strike with a warning, and...
Read Blog
June 28, 2017

Petya ransomware is affecting users globally, here are things you can do

Petya ransomware is affecting users globally, here are things you can do

Estimated reading time: 2 minutes

Quick Heal Security Labs has come across a new strain of Petya Ransomware that is affecting users globally. This clearly looks like early signs of a new ransomware attack that is spreading fast across the globe. Currently we have...
Read Blog
June 28, 2017
1

Seqrite Endpoint Security v7.2 receives BEST+++ certification from AVLab

Seqrite Endpoint Security v7.2 receives BEST+++ certification from AVLab

Estimated reading time: < 1 minute

AVLab is an independent organization that conducts tests on security software for corporate networks and individual user devices. These tests are conducted by using malicious software, tools, and bypassing security techniques that are used in real cyberattacks. In April...
Read Blog
June 26, 2017

AES-NI Ransomware adopts combination of Fileless and Code Injection technique

AES-NI Ransomware adopts combination of Fileless and Code Injection technique

Estimated reading time: 3 minutes

Cybercriminals are adopting unique ways for spreading malware and this has been evident in the cases of the Cerber ransomware where the RIG exploit was used and the WannaCry ransomware which used the SMBv1 vulnerability. And now it’s the...
Read Blog
June 23, 2017

Endpoint Security: Next Gen Threat Prevention

Endpoint Security: Next Gen Threat Prevention

Estimated reading time: 2 minutes

Gone are the days when employees used to walk into the office, login into their systems, finish their daily tasks and walk out. Today, the jobs scenario is different. Working from remote locations, signing in at different hours, logging...
Read Blog
June 23, 2017

Mobile Device Management: The necessity to secure your enterprise

Mobile Device Management: The necessity to secure your enterprise

Estimated reading time: 3 minutes

In today’s day and age, mobile devices are the most omnipresent and utilized creations on Earth and have permeated both professional and personal lives of individuals. This increasing presence has led organizations to further their employees’ productivity and ease of...
Read Blog
June 22, 2017

WannaCry’s Never Say Die Attitude Keeps It Going!

WannaCry’s Never Say Die Attitude Keeps It Going!

Estimated reading time: 3 minutes

Over the past few months, the cybersecurity world was at buzz due to the infamous WannaCry ransomware attack. The attack was launched on a massive scale. The campaign started after the disclosure of NSA exploit leak by a hacker...
Read Blog
June 22, 2017

Choosing a UTM Security Solution

Choosing a UTM Security Solution

Estimated reading time: 3 minutes

Organizations face cyber threats on multiple fronts. There is a threat of virus and malware that can corrupt the data on individual machines and servers, malware that can damage the systems and programs, network intrusions to steal the information from the...
Read Blog
June 21, 2017
2
← Previous 1 … 65 66 67 … 72 Next →
Featured Authors
  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director of Quick Heal Technologies...

    Read more..
  • Mahua Chakrabarthy
    Mahua Chakrabarthy

    A tea connoisseur who firmly believes that life is too short for dull content....

    Read more..
Topics
apt (19) Cyber-attack (35) cyber-attacks (58) cyberattack (16) cyberattacks (13) Cybersecurity (319) cyber security (30) Cyber threat (33) cyber threats (48) Data (11) data breach (55) data breaches (28) data loss (28) data loss prevention (34) data protection (24) data security (15) DLP (49) Encryption (16) endpoint security (106) Enterprise security (17) Exploit (14) firewall (11) GDPR (12) hackers (11) IoT (10) malware (76) malware attack (23) malware attacks (12) MDM (25) Microsoft (15) Network security (22) Patch Management (12) phishing (27) Ransomware (67) ransomware attack (30) ransomware attacks (30) ransomware protection (13) security (11) Seqrite (33) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (16) windows (11)
Loading
Resources
  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies
About Us
  • About Seqrite
  • Leadership
  • Awards & Certifications
  • Newsroom
Archives
  • By Date
  • By Category
Loading

© 2025 Quick Heal Technologies Ltd. Cookie Policies Privacy Policies