• News
  • Security
  • Products
  • About Seqrite
Blogs on Information Technology, Network & Cybersecurity | Seqrite Blog
  • News
  • Security
  • Products
  • About Seqrite

Information Technology, Network Security & Cybersecurity Updates

Unmasking AsukaStealer: The $80 Malware Threatening Your Digital Security

Unmasking AsukaStealer: The $80 Malware Threatening Your Digital Security

Estimated reading time: 4 minutes

AsukaStealer, marketed on a Russian-language cybercrime forum by the alias ‘breakcore,’ has been exposed. The perpetrator offers its services for a monthly fee of $80, targeting individuals and organizations seeking to exploit its capabilities for malicious purposes. Written in...
Read Blog
May 30, 2024

Why Endpoint Detection and Response (EDR) Is The Future of Endpoint Protection?

Why Endpoint Detection and Response (EDR) Is The Future of Endpoint Protection?

Estimated reading time: 5 minutes

Why Endpoint Detection and Response (EDR) Is The Future of Endpoint Protection?  Studies show that nearly 90% of cyberattacks and 70% of data breaches start at endpoint devices. Traditional security solutions like antivirus and firewalls are limited to detecting...
Read Blog
May 27, 2024

Why 60% of enterprises are moving from VPNs to Zero Trust Network Access?

Why 60% of enterprises are moving from VPNs to Zero Trust Network Access?

Estimated reading time: 4 minutes

Why 60% of enterprises are moving from VPNs to Zero Trust Network Access ? In today’s rapidly evolving digital landscape, organizations are grappling with the challenges posed by remote and hybrid work models. As the traditional enterprise perimeter continues...
Read Blog
May 22, 2024

Pakistani APTs Escalate Attacks on Indian Gov. Seqrite Labs Unveils Threats and Connections

Pakistani APTs Escalate Attacks on Indian Gov. Seqrite Labs Unveils Threats and Connections

Estimated reading time: 11 minutes

In the recent past, cyberattacks on Indian government entities by Pakistan-linked APTs have gained significant momentum. Seqrite Labs APT team has discovered multiple such campaigns during telemetry analysis and hunting in the wild. One such threat group, SideCopy, has...
Read Blog
April 24, 2024

The 12 Essential Features Defining Advanced Endpoint Security Solutions

The 12 Essential Features Defining Advanced Endpoint Security Solutions

Estimated reading time: 4 minutes

The 12 Essential Features Defining Advanced Endpoint Security Solution Endpoint security is a critical aspect of protecting an organization’s network and data from evolving threats. As the sophistication and abundance of endpoint threats continue to grow, advanced endpoint security...
Read Blog
April 22, 2024

Ghost Locker 2.0: The Evolving Threat of Ransomware-as-a-Service Unveiled by GhostSec

Ghost Locker 2.0: The Evolving Threat of Ransomware-as-a-Service Unveiled by GhostSec

Estimated reading time: 6 minutes

Ghost Locker is a Ransomware-as-a-Service (Raas) created by GhostSec [hacktivist groups]. In October 2023, GhostSec launched the GhostLocker framework. After their successful collaborative operations with the Stormous ransomware group in July 2023, GhostLocker ransomware operators provide various options for...
Read Blog
April 18, 2024

Exposing Coyote: The Next-Gen Banking Trojan Revolutionizing Cyber Threats in Brazil

Exposing Coyote: The Next-Gen Banking Trojan Revolutionizing Cyber Threats in Brazil

Estimated reading time: 4 minutes

Recently, we came across a new banking trojan called Coyote, which utilizes a tool/library called Squirrel Installer, developed to install and manage updates of windows applications. The malware looks more evolved than our normal banking trojans and can potentially...
Read Blog
April 11, 2024

CVE-2024-3094 Unveiled: XZ Utils Compromise Sparks Security Alarm

CVE-2024-3094 Unveiled: XZ Utils Compromise Sparks Security Alarm

Estimated reading time: 3 minutes

On Friday, March 29, developer Andres Freund detected unusual behavior in his Debian sid environment. In response, he contacted an open-source security mailing list to report his discovery of an upstream backdoor in the commonly used command-line tool XZ...
Read Blog
April 11, 2024

Unveiling Abyss Locker: The Rapid Rise of a Menacing Ransomware Threat

Unveiling Abyss Locker: The Rapid Rise of a Menacing Ransomware Threat

Estimated reading time: 4 minutes

Introduction:  Originating in March 2023, Abyss Locker, a recently established ransomware operation, has swiftly targeted companies, transforming into a significant threat across various sectors, such as industrial control systems (ICS), enterprises, and public-sector organizations. It poses a significant threat...
Read Blog
April 11, 2024

Preparing the Manufacturing Industry for New Age Cyber Attacks

Preparing the Manufacturing Industry for New Age Cyber Attacks

Estimated reading time: 3 minutes

‍In today’s interconnected world, the manufacturing industry is increasingly vulnerable to cyber-attacks. Recent incidents, such as the cyber attack on Suzuki motorcycles and the impact on billion-dollar companies like NVIDIA and Colonial Pipeline, highlight the devastating consequences of these...
Read Blog
March 29, 2024
← Previous 1 … 6 7 8 … 72 Next →
Featured Authors
  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director of Quick Heal Technologies...

    Read more..
  • Mahua Chakrabarthy
    Mahua Chakrabarthy

    A tea connoisseur who firmly believes that life is too short for dull content....

    Read more..
Topics
apt (19) Cyber-attack (35) cyber-attacks (58) cyberattack (16) cyberattacks (13) Cybersecurity (321) cyber security (30) Cyber threat (33) cyber threats (48) Data (11) data breach (55) data breaches (28) data loss (28) data loss prevention (34) data protection (24) data security (15) DLP (49) Encryption (16) endpoint security (106) Enterprise security (17) Exploit (14) firewall (11) GDPR (12) hackers (11) IoT (10) malware (76) malware attack (23) malware attacks (12) MDM (25) Microsoft (15) Network security (22) Patch Management (12) phishing (27) Ransomware (67) ransomware attack (30) ransomware attacks (30) ransomware protection (13) security (11) Seqrite (33) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (16) windows (11)
Loading
Resources
  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies
About Us
  • About Seqrite
  • Leadership
  • Awards & Certifications
  • Newsroom
Archives
  • By Date
  • By Category
Loading

© 2025 Quick Heal Technologies Ltd. Cookie Policies Privacy Policies