• News
  • Security
  • Products
  • About Seqrite
Blogs on Information Technology, Network & Cybersecurity | Seqrite Blog
  • News
  • Security
  • Products
  • About Seqrite

Information Technology, Network Security & Cybersecurity Updates

WannaCry Ransomware Creating Havoc Worldwide by Exploiting Patched Windows Exploit!

WannaCry Ransomware Creating Havoc Worldwide by Exploiting Patched Windows Exploit!

Estimated reading time: 3 minutes

Ransomware are causing major disruptions in recent years. Recently leaked dump of NSA EternalBlue exploit is used by cybercriminals to spread WannaCry ransomware worldwide. Dump of MS-17-010 Windows OS Vulnerability was made public by the notorious Shadow Broker group...
Read Blog
May 13, 2017

Banking malware, Dridex bounces back through PDF

Banking malware, Dridex bounces back through PDF

Estimated reading time: 3 minutes

Dridex is a banking malware which uses macros to spread on windows systems. Spam email attachments are utilized to spread this infection. Banking malware are generally key loggers. They trick users into opening the attachment; it then records the...
Read Blog
May 10, 2017

Brute force attack on Microsoft SQL

Brute force attack on Microsoft SQL

Estimated reading time: 2 minutes

In recent events, we have been observing that hackers have started targeting Microsoft SQL(MSSQL) servers using its open TCP port. The database is configured with weak password, despite administrators agreeing to the importance of it. The reasons could be ease...
Read Blog
May 4, 2017

Latest AV-TEST report rates Seqrite EPS as ‘Top Product’ again

Latest AV-TEST report rates Seqrite EPS as ‘Top Product’ again

Estimated reading time: 2 minutes

In January and February 2017, AV-TEST tested 13 security products. AV-TEST considered only realistic test scenarios and tested the products against current threats. The products had to prove their abilities by using all functions and protection levels. Seqrite EPS received...
Read Blog
March 30, 2017

Cyber Security for the Education Sector

Cyber Security for the Education Sector

Estimated reading time: 3 minutes

Schools, colleges and universities possess huge records comprising critical information about students. They hold the responsibility of protecting confidential information of students which includes, grade sheets, transcripts, financial records etc. Here are some important cyber security suggestions to follow...
Read Blog
March 27, 2017
1

Facts we bet you didn’t know about enterprise security

Facts we bet you didn’t know about enterprise security

Estimated reading time: < 1 minute

1. Mobile will continue to rise as a point of entry for hackers. Seqrite Mobile Device Management allows enterprises to grant their employees the privilege of mobile productivity without boundaries. Know more: https://bit.ly/2mSlXDI 2. Employees’ mobile devices are already causing costly...
Read Blog
March 17, 2017

Quick Heal Annual Threat Report 2017: Excerpts

Quick Heal Annual Threat Report 2017: Excerpts

Estimated reading time: 2 minutes

Quick Heal Threat Reports are collated after intensive research by our Threat Research and Response Team. They provide an overview and analysis of threat activity reported from Quick Heal installations all over the world. The recently launched Quick Heal...
Read Blog
March 9, 2017

Why should cybersecurity be a part of your Financial Budget?

Why should cybersecurity be a part of your Financial Budget?

Estimated reading time: 2 minutes

Organizations across the world that experienced a cyberattack have suffered huge revenue losses. Cybersecurity is a business priority and it is important that the C-suite must understand the importance of enterprise security and fund it appropriately. No enterprise, big...
Read Blog
February 13, 2017

Spear Phishing: What is it and how it can affect your business security

Spear Phishing: What is it and how it can affect your business security

Estimated reading time: 3 minutes

What is Spear Phishing? Spear phishing is a variation of a phishing scam wherein hackers send a targeted email to an individual which appears to be from a trusted source. The agenda of these mails like any other cyber...
Read Blog
January 16, 2017

Cybersecurity for Financial Services

Cybersecurity for Financial Services

Estimated reading time: 3 minutes

No doubt financial services sector continues to be an attractive target for hackers. In 2016, we saw a huge number of cyberattacks on banks and other financial services companies. A single security breach can affect the organization as well...
Read Blog
January 9, 2017
← Previous 1 … 68 69 70 … 72 Next →
Featured Authors
  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director of Quick Heal Technologies...

    Read more..
  • Mahua Chakrabarthy
    Mahua Chakrabarthy

    A tea connoisseur who firmly believes that life is too short for dull content....

    Read more..
Topics
apt (19) Cyber-attack (35) cyber-attacks (58) cyberattack (16) cyberattacks (13) Cybersecurity (319) cyber security (30) Cyber threat (33) cyber threats (48) Data (11) data breach (55) data breaches (28) data loss (28) data loss prevention (34) data protection (24) data security (15) DLP (49) Encryption (16) endpoint security (106) Enterprise security (17) Exploit (14) firewall (11) GDPR (12) hackers (11) IoT (10) malware (76) malware attack (23) malware attacks (12) MDM (25) Microsoft (15) Network security (22) Patch Management (12) phishing (27) Ransomware (67) ransomware attack (30) ransomware attacks (30) ransomware protection (13) security (11) Seqrite (33) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (16) windows (11)
Loading
Resources
  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies
About Us
  • About Seqrite
  • Leadership
  • Awards & Certifications
  • Newsroom
Archives
  • By Date
  • By Category
Loading

© 2025 Quick Heal Technologies Ltd. Cookie Policies Privacy Policies