• News
  • Security
  • Products
  • About Seqrite
Blogs on Information Technology, Network & Cybersecurity | Seqrite Blog
  • News
  • Security
  • Products
  • About Seqrite

Information Technology, Network Security & Cybersecurity Updates

SideCopy’s Multi-platform Onslaught: Leveraging WinRAR Zero-Day and Linux Variant of Ares RAT

SideCopy’s Multi-platform Onslaught: Leveraging WinRAR Zero-Day and Linux Variant of Ares RAT

Estimated reading time: 11 minutes

SEQRITE Labs APT-Team has discovered multiple campaigns of APT SideCopy, targeting Indian government and defense entities in the past few months. The threat group is now exploiting the recent WinRAR vulnerability CVE-2023-38831 (See our advisory for more details) to...
Read Blog
November 6, 2023

MedusaLocker Ransomware: An In-Depth Technical Analysis and Prevention Strategies

MedusaLocker Ransomware: An In-Depth Technical Analysis and Prevention Strategies

Estimated reading time: 5 minutes

Our recent research has highlighted the presence of the MedusaLocker ransomware, which first surfaced in mid-2019. Its primary targets are the Hospital and Healthcare industries. MedusaLocker employs AES and RSA encryption techniques to encrypt victims’ data. Technical analysis At...
Read Blog
October 16, 2023

Critical Security Alert: CVE-2023-32315 Vulnerability in Openfire XMPP Server

Critical Security Alert: CVE-2023-32315 Vulnerability in Openfire XMPP Server

Estimated reading time: 4 minutes

Openfire is an open-source, real-time collaboration server based on the XMPP (Extensible Messaging and Presence Protocol) protocol. It facilitates instant messaging, group chat, and other real-time communication services. Openfire is popular for its flexibility, scalability, and robust security features....
Read Blog
September 14, 2023

New Warp Malware drops modified Stealerium Infostealer

New Warp Malware drops modified Stealerium Infostealer

Estimated reading time: 2 minutes

Overview In the 1990s, as the internet gained popularity, cybercriminals started developing and distributing basic forms of malware, including password stealers. Early stealer malware primarily targeted login credentials and passwords for online services and email accounts. As technology advanced,...
Read Blog
September 6, 2023

Cloud Security Under Siege: Fortify Your Defences Against Emerging Threats

Cloud Security Under Siege: Fortify Your Defences Against Emerging Threats

Estimated reading time: 3 minutes

Can the cloud be hacked? Yes, and when the cloud is hacked – it is not just data at risk! The emerging digital ecosystem is treacherous. Today, every company, whether large or small, is a reachable target with operations,...
Read Blog
September 5, 2023

THREAT ADVISORY: Zero-Day Vulnerabilities Detected on WinRAR

THREAT ADVISORY: Zero-Day Vulnerabilities Detected on WinRAR

Estimated reading time: 4 minutes

Zero-day vulnerabilities represent an imminent threat to cyber security, and in this case, two such vulnerabilities, CVE-2023-38831 and CVE-2023-40477, have been identified in the widely utilized WinRAR software. These vulnerabilities pose a grave concern due to their potential for...
Read Blog
September 4, 2023

Exploring Mallox Ransomware: Tactics, Techniques, and Defense

Exploring Mallox Ransomware: Tactics, Techniques, and Defense

Estimated reading time: 7 minutes

Introduction: First observed in the middle of 2021, Mallox Ransomware has emerged as a formidable threat in the cybercrime landscape. With its ability to encrypt all volumes, including local and network-shared drives, it gradually spreads control over the system,...
Read Blog
August 25, 2023

Decoding The Digital Personal Data Protection Act, 2023 In 7 Key Points

Decoding The Digital Personal Data Protection Act, 2023 In 7 Key Points

Estimated reading time: 4 minutes

Data protection laws have become increasingly relevant in today’s digital age, where businesses collect, store, and process large amounts of personally identifiable information. With India gradually emerging as a data-driven economy, the recent Digital Personal Data Protection (DPDP) Act...
Read Blog
August 25, 2023

The Critical Importance of Cyber Securing ISRO’s Space Missions

The Critical Importance of Cyber Securing ISRO’s Space Missions

Estimated reading time: 3 minutes

In a monumental leap for India’s space exploration journey, the Indian Space Research Organisation (ISRO) has captured the world’s attention with its successful Chandrayaan 3 moon landing. The culmination of meticulous planning, dedication, and scientific prowess, this achievement marks...
Read Blog
August 24, 2023

Threat Advisory: Mallox Ransomware Strikes Unsecured MSSQL Servers

Threat Advisory: Mallox Ransomware Strikes Unsecured MSSQL Servers

Estimated reading time: 3 minutes

We have observed a sudden increase in Ransomware incidents since June 2023, involving the appending of the “.malox” file extension to encrypt files. This Ransomware has been identified as a variant of the Mallox (aka TargetCompany) Ransomware Family. The...
Read Blog
August 4, 2023
← Previous 1 … 8 9 10 … 72 Next →
Featured Authors
  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director of Quick Heal Technologies...

    Read more..
  • Mahua Chakrabarthy
    Mahua Chakrabarthy

    A tea connoisseur who firmly believes that life is too short for dull content....

    Read more..
Topics
apt (19) Cyber-attack (35) cyber-attacks (58) cyberattack (16) cyberattacks (13) Cybersecurity (319) cyber security (30) Cyber threat (33) cyber threats (48) Data (11) data breach (55) data breaches (28) data loss (28) data loss prevention (34) data protection (24) data security (15) DLP (49) Encryption (16) endpoint security (106) Enterprise security (17) Exploit (14) firewall (11) GDPR (12) hackers (11) IoT (10) malware (76) malware attack (23) malware attacks (12) MDM (25) Microsoft (15) Network security (22) Patch Management (12) phishing (27) Ransomware (67) ransomware attack (30) ransomware attacks (30) ransomware protection (13) security (11) Seqrite (33) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (16) windows (11)
Loading
Resources
  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies
About Us
  • About Seqrite
  • Leadership
  • Awards & Certifications
  • Newsroom
Archives
  • By Date
  • By Category
Loading

© 2025 Quick Heal Technologies Ltd. Cookie Policies Privacy Policies