• News
  • Security
  • Products
  • About Seqrite
Blogs on Information Technology, Network & Cybersecurity | Seqrite Blog
  • News
  • Security
  • Products
  • About Seqrite

Information Technology, Network Security & Cybersecurity Updates

Traversing the Cyber Threat Terrain in 2024: Insights, Expert Guidance, and Collective Resilience

Traversing the Cyber Threat Terrain in 2024: Insights, Expert Guidance, and Collective Resilience

Estimated reading time: 2 minutes

The year 2023 was eventful, witnessing a myriad of advanced threats targeting prominent economies, including India. Many still remember the fake IRCTC app that stole sensitive user information or the infamous loan apps that devastated many innocent lives. Malware...
Read Blog
February 8, 2024

Navigating India’s Data Protection Landscape: A SEQRITE Perspective

Navigating India’s Data Protection Landscape: A SEQRITE Perspective

Estimated reading time: 3 minutes

India’s swift enactment of the Digital Personal Data Protection (DPDP) Act has triggered considerable apprehension among businesses, mainly due to the impending deadline for compliance. Several myths regarding the Act have further intensified the confusion. To educate the business...
Read Blog
January 29, 2024

All About XDR and Its Many Capabilities

All About XDR and Its Many Capabilities

Estimated reading time: 4 minutes

What is XDR? Let us understand what is XDR, also called as Extended Detection and Response.  XDR is a cybersecurity solution that goes beyond traditional security measures by unifying threat data from various sources within an organization’s IT ecosystem....
Read Blog
January 18, 2024

How To Prevent Remote Ransomware: The Easy Way

How To Prevent Remote Ransomware: The Easy Way

Estimated reading time: 4 minutes

Ransomware attacks today have become increasingly prevalent and sophisticated. One such alarming trend is the surge in remote ransomware attacks, also known as malicious remote encryption. This attack vector involves using compromised endpoints to encrypt data on other devices...
Read Blog
January 9, 2024

Operation RusticWeb targets Indian Govt: From Rust-based malware to Web-service exfiltration

Operation RusticWeb targets Indian Govt: From Rust-based malware to Web-service exfiltration

Estimated reading time: 11 minutes

SEQRITE Labs APT-Team has uncovered a phishing campaign targeting various Indian government personnel since October 2023. We have also identified targeting of both government and private entities in the defence sector over December. New Rust-based payloads and encrypted PowerShell commands have been utilized...
Read Blog
December 21, 2023

Time to Secure the Future is Now: Use Cases for Choosing XDR Solution

Time to Secure the Future is Now: Use Cases for Choosing XDR Solution

Estimated reading time: 3 minutes

With an ever-growing attack surface in a hyper-connected digital world, there has never been a more critical time to secure the future. With access to tools like ChatGPT and more personalized spear-phishing attacks, hackers are always one step ahead,...
Read Blog
December 20, 2023

Decoding BATLOADER 2.X: Unmasking the Threat of Stealthy Malware Tactics

Decoding BATLOADER 2.X: Unmasking the Threat of Stealthy Malware Tactics

Estimated reading time: 5 minutes

Overview: Batloader is not a new malware in the series – it is an emerging one. In our previous blogs, we discussed how Batloader can deploy different types of malware, including stealers and ransomware. We also delved into its...
Read Blog
December 18, 2023

Cerber Ransomware Exposed: A Comprehensive Analysis of Advanced Tactics, Encryption, and Evasion

Cerber Ransomware Exposed: A Comprehensive Analysis of Advanced Tactics, Encryption, and Evasion

Estimated reading time: 6 minutes

Cerber is a strain of ransomware that was first identified in early 2016. It is a type of malware that encrypts a victim’s files and demands a ransom for the decryption key needed to unlock the files. Cerber, like...
Read Blog
December 13, 2023

Traversing the Cybersecurity Landscape: Unveiling the Essence of XDR

Traversing the Cybersecurity Landscape: Unveiling the Essence of XDR

Estimated reading time: 3 minutes

In the ever-evolving territory of cybersecurity, where businesses face persistent incidents of Advanced Attacks, the Extended Detection and Response (XDR) solution has become a crucial component in fortifying their IT infrastructure. This blog highlights the gist of the SEQRITE-ETCISO...
Read Blog
December 11, 2023

Casting Light on BATLOADER: An Insight into its Role in Malware Delivery

Casting Light on BATLOADER: An Insight into its Role in Malware Delivery

Estimated reading time: 5 minutes

Overview: In our rapidly advancing technological landscape, cyber threat actors have grown increasingly sophisticated, employing intricate attack chains and malicious applications. They meticulously plan and execute well-defined, strategic attacks that unfold in stages. A typical malware attack comprises various...
Read Blog
November 8, 2023
← Previous 1 … 7 8 9 … 72 Next →
Featured Authors
  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director of Quick Heal Technologies...

    Read more..
  • Mahua Chakrabarthy
    Mahua Chakrabarthy

    A tea connoisseur who firmly believes that life is too short for dull content....

    Read more..
Topics
apt (19) Cyber-attack (35) cyber-attacks (58) cyberattack (16) cyberattacks (13) Cybersecurity (319) cyber security (30) Cyber threat (33) cyber threats (48) Data (11) data breach (55) data breaches (28) data loss (28) data loss prevention (34) data protection (24) data security (15) DLP (49) Encryption (16) endpoint security (106) Enterprise security (17) Exploit (14) firewall (11) GDPR (12) hackers (11) IoT (10) malware (76) malware attack (23) malware attacks (12) MDM (25) Microsoft (15) Network security (22) Patch Management (12) phishing (27) Ransomware (67) ransomware attack (30) ransomware attacks (30) ransomware protection (13) security (11) Seqrite (33) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (16) windows (11)
Loading
Resources
  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies
About Us
  • About Seqrite
  • Leadership
  • Awards & Certifications
  • Newsroom
Archives
  • By Date
  • By Category
Loading

© 2025 Quick Heal Technologies Ltd. Cookie Policies Privacy Policies