Estimated reading time: 5 minutes
Introduction: Attackers are continuously developing different techniques to infect systems and steal sensitive information. A recent campaign a multi-stage infection chain that starts with a LNK file, which lures the victim into opening an invoice in a web browser....Information Technology, Network Security & Cybersecurity Updates

Estimated reading time: 4 minutes
Introduction XWorm is an evasive and flexible malware recognized for its modular design. It uses obfuscation techniques to avoid detection. It communicates with a Command and Control server and executes malicious activities. After execution, the malware decrypts its configuration...
Estimated reading time: 3 minutes
The modern-day healthcare industry faces unique cybersecurity challenges. On the one hand, cutting-edge technologies and increasing digitization have helped elevate healthcare quality, yet they have also threatened the privacy and security of patient data. According to The HIPPA Journal’s...
Estimated reading time: 4 minutes
At the recent Banking Frontier’s NCBS and FCBA Awards and Conference, Seqrite’s Chief Product Officer, Dr. Lalit Mohan Sanagavarapu, delivered a keynote titled “Zero Trust, Maximum Security: Protecting Cooperative Banks in a Highly Competitive Digital Era.” This address spotlighted...
Estimated reading time: 11 minutes
Contents Introduction Key Targets. Industries Affected. Geographical Focus. Initial Findings. Looking into the decoy-document – I Looking into the decoy-document – II Infection Chain. Technical Analysis Stage 1 – Malicious LNK Script & VBScript. Stage 2 – Malicious Cobalt...
Estimated reading time: 2 minutes
The recent data breach at one of India’s largest health insurance companies has left millions of customers vulnerable, raising serious concerns about data privacy and security. With personal and medical information exposed, many are left wondering: How could this...
Estimated reading time: 4 minutes
In today’s rapidly evolving cybersecurity landscape, enterprises face an onslaught of sophisticated threats that can evade traditional security measures. From stealthy malware to advanced persistent threats (APTs), the arsenal of modern cybercriminals continues to expand, posing formidable challenges to...
Estimated reading time: 5 minutes
In today’s time, one of the most formidable threats organizations face today is the Advanced Persistent Threat (APT). These sophisticated, targeted attacks are designed to infiltrate networks, steal sensitive data, and wreak havoc on critical infrastructure – all while...
Estimated reading time: 4 minutes
In today’s ever-evolving cyber threat landscape, organizations face an escalating challenge in safeguarding their critical assets from the relentless onslaught of sophisticated attacks. As adversaries become increasingly adept at concealing their activities within trusted components of the digital environment,...
Estimated reading time: 9 minutes
Seqrite Labs APT-Team has recently found a campaign targeting the Czech Republic. The campaign targets government and military officials with multiple lures aimed at the relationship between NATO and the Czech Republic. The entire malware ecosystem is involved in...