• News
  • Security
  • Products
  • About Seqrite
Seqrite Blog Blog
  • News
  • Security
  • Products
  • About Seqrite

Antivirus For Linux Archive

CVE-2019-11815: Experts discovered a privilege escalation vulnerability in the Linux Kernel

Estimated reading time: 2 minutes

Red Hat engineers and experts discovered a memory corruption vulnerability in Linux kernel, which is basically a flaw while implementation of RDS (Remote desktop Protocol) over TCP. This flaw has affected Red Hat, Ubuntu, Debian and SUSE and security...
Read More
May 27, 2019

Why trust Seqrite? Don’t take our word for it. Hear it from our customers

customer-success-case-study-IT-security

Estimated reading time: 3 minutes

Seqrite’s range of world-class cybersecurity solutions are defined by innovation and simplicity. The solutions provided are a combination of intelligence, analysis of applications and state-of-the-art technology, and are designed to provide better protection for our customers. Backed by Quick...
Read More
September 5, 2018
  • 7
    Shares
1

What are exploits? Everything you need to know

exploits-vulnerability

Estimated reading time: 3 minutes

Cybersecurity experts are always cautious when they hear the word “exploits”, and for good reason. Exploits are often a preferred channel through which cybercriminals like to hit their targets. What makes it easier for these criminals is that exploits...
Read More
August 25, 2018
  • 16
    Shares

Importance of industry certifications for security products and what do they mean

Seqrite-industry certification

Estimated reading time: 3 minutes

The importance of cybersecurity has slowly seeped into the consciousness of enterprises. A cybercrime can undo years of work in an instant and enterprises are recognizing this and trying to find ways to stay safe. Hence, investment in security...
Read More
August 16, 2018
  • 3
    Shares

What India’s data protection law might mean for your business

India's data protection law

Estimated reading time: 3 minutes

India has taken a step forward towards laying down a proper policy for data protection. The Srikrishna Committee, a 10-member expert committee headed by former Supreme Court judge BN Srikrishna and appointed by the Indian government in August 2017...
Read More
August 6, 2018
  • 305
    Shares

5 Cybersecurity Myths for Linux Users

Estimated reading time: 3 minutes

When we talk about operating systems, the immediate names that come to mind are Microsoft Windows and Apple Macintosh. Yet, while they may be two of the most well-known operating systems around, there is also quite a portion of...
Read More
May 8, 2018
  • 7
    Shares

Seqrite AntiVirus for Linux: Protect your Linux against malware

Seqrite Antivirus for Linux

Estimated reading time: 3 minutes

In the age of multi-OS platforms, it is not always easy to find the perfect cybersecurity solution for your software. Many of the common antivirus platforms today are designed for the purpose of the most popular ones, Windows and...
Read More
April 5, 2018
  • 8
    Shares

Seqrite AntiVirus for Linux: Comprehensive antivirus solution for Linux networks

Seqrite AntiVirus for Linux

Estimated reading time: 1 minute

Seqrite AntiVirus for Linux is designed to simplify security configurations and synchronize control on Linux networks across all levels of the organization. Seqrite AntiVirus for Linux shields Linux systems against malware. It offers On-demand and Schedule scanning, Samba Share...
Read More
August 14, 2017
  • 190
    Shares

A single infected computer can cost your business millions of dollars, know how to save

Computer infections

Estimated reading time: 4 minutes

It was August 5th, 2012, when a massive cyber-attack crippled operations of one of the world’s leading petroleum and natural gas company, Saudi Aramco. A Virus named ‘Shamoon’ wiped out data from 35,000 computers bringing most of their operations...
Read More
July 11, 2017

CertLock Trojan can disable your antivirus software

Estimated reading time: 2 minutes

An antivirus software keeps your computer safe from malware, viruses, online threats, and suspicious or harmful elements. Although bypassing this protective guard is a difficult task for attackers, they never stop trying to do so. Recently, we came across...
Read More
June 13, 2017

Popular Posts

  • RAT used by Chinese cyberspies infiltrating Indian businesses RAT used by Chinese cyberspies infiltrating Indian businesses December 18, 2020
  • How can EdTech companies deal with rising security challenges? How can EdTech companies deal with rising security challenges? December 24, 2020
  • Benefits of having Intrusion Prevention/Detection System in your enterprise Benefits of having Intrusion Prevention/Detection System in your enterprise February 15, 2018

Featured Authors

  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Viraj Talikotkar
    Viraj Talikotkar

    Viraj is a Lead Technical Writer at Quick Heal Technologies. He is always on...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director and Chief Technology Officer of...

    Read more..

Latest Posts

  • Are we prepared against risks generating from the IoT revolution?

    Are we prepared against risks generating from the IoT revolution?

    January 15, 2021
  • Proactiveness is the key to resolving hybrid cloud’s security challenges

    Proactiveness is the key to resolving hybrid cloud’s security challenges

    January 6, 2021
  • How can EdTech companies deal with rising security challenges?

    How can EdTech companies deal with rising security challenges?

    December 24, 2020

Stay Updated!

Topics

Antivirus For Linux (10) Antivirus For Server (9) BYOD (9) Cyber-attack (31) cyber-attacks (56) cyberattacks (12) Cybersecurity (274) cyber security (25) Cyber threat (29) cyber threats (44) Data (10) data breach (50) data breaches (27) data loss (28) data loss prevention (33) data protection (21) data security (13) DLP (49) Encryption (16) endpoint security (102) Enterprise security (14) EPS (9) Exploit (12) firewall (11) hackers (9) incident response plan (9) IoT (10) malware (58) malware attack (22) malware attacks (12) MDM (25) mobile device management (9) Network security (18) Patch Management (12) phishing (16) Ransomware (54) ransomware attack (29) ransomware attacks (30) ransomware protection (12) Seqrite (24) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (10)

Products

  • Endpoint Security (EPS)
  • Seqrite Encryption Manager
  • Seqrite Endpoint Security Cloud
  • Cloud Security
  • Seqrite mSuite
  • Seqrite MobiSMART
  • Unified Threat Management
  • Seqrite Secure Web Gateway
  • Antivirus for Server
  • Antivirus for Linux

Resources

  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies

About Us

  • Company Overview
  • Leadership
  • Why choose SEQRITE?
  • Awards & Certifications
  • Newsroom

Archives

  • By Date
  • By Category

© 2020 Quick Heal Technologies Ltd. (Formerly Known as Quick Heal Technologies Pvt. Ltd.) Cookie Policies Privacy Policies

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website.
By browsing this website, you agree to our cookie policy.