• News
  • Security
  • Products
  • About Seqrite
Blogs on Information Technology, Network & Cybersecurity | Seqrite Blog
  • News
  • Security
  • Products
  • About Seqrite

Tag: apt

Turn the Page: Cybersecurity Predictions for 2021 & beyond

Turn the Page: Cybersecurity Predictions for 2021 & beyond

Estimated reading time: 2 minutes

Making accurate predictions, especially for cybersecurity needs years of experience — 2020 was a different situation altogether. Amidst many forecasts, no one predicted the onslaught of a global pandemic that would disrupt the world as we know it, baffling...
Read Blog
February 18, 2021

RAT used by Chinese cyberspies infiltrating Indian businesses

RAT used by Chinese cyberspies infiltrating Indian businesses

Estimated reading time: 4 minutes

A few months back, Delphibased malware was being distributed on multiple systems via SMB exploit. The payloads used by this malware have close similarities with open-source Gh0stRAT code. Gh0st has been used by Chinese threat actors to target multiple...
Read Blog
December 18, 2020

Attacks on the defence sector could prove very costly!

Attacks on the defence sector could prove very costly!

Estimated reading time: 2 minutes

In the current modern era of information warfare, securing military assets has become strategically very important. Recently, Seqrite reported on Operation ‘Honey Trap’, an operation launched by a Pakistan-linked threat actor allegedly, which targeted employees from Indian defence organizations....
Read Blog
October 16, 2020

Operation SideCopy!

Operation SideCopy!

Estimated reading time: 2 minutes

An insight into Transparent Tribe’s sub-division which has been incorrectly attributed for years. Introduction Quick Heal’s threat intelligence team recently uncovered evidence of an advanced persistent threat (APT) against Indian defence forces. Our analysis shows that many old campaigns...
Read Blog
September 23, 2020
4

Gorgon APT targeting MSME sector in India

Gorgon APT targeting MSME sector in India

Estimated reading time: 5 minutes

From the past few months, we have been monitoring cyber-threats on MSME [Micro, Small and Medium Enterprises] sector within India. MSME sector is considered to be the backbone of the Indian economy. MSME employs around 40% of the country’s...
Read Blog
August 10, 2020

Operation ‘Honey Trap’: APT36 Targets Defence Organizations in India

Operation ‘Honey Trap’: APT36 Targets Defence Organizations in India

Estimated reading time: 3 minutes

Summary In the last 3 months, we have noticed increased activity from APT36, a Pakistan-linked Cyber Threat actor. The target this time are personnel belonging to defence organizations & other Government organizations in India. In the recent wave of...
Read Blog
July 8, 2020

Transparent Tribe Targeting Critical Indian Organizations

Transparent Tribe Targeting Critical Indian Organizations

Estimated reading time: 5 minutes

Quick Heal Labs have been tracking this Cyber-espionage operation since 2016. We have identified this attack as operation m_project. From the past year, we have seen a surge in these APT activities. Modus operandi of the attackers have remained...
Read Blog
May 12, 2020

The healthcare industry’s largest cyber challenges

The healthcare industry’s largest cyber challenges

Estimated reading time: 3 minutes

A 2018 national audit of healthcare preparedness observed that only 45 percent of businesses followed the NIST Cybersecurity Framework, a policy framework for cybersecurity guidance for private sector organizations in the United States. No wonder then that the healthcare...
Read Blog
September 17, 2019

APT-27 like Newcore RAT, Virut exploiting MySQL for targeted attacks on enterprise

APT-27 like Newcore RAT, Virut exploiting MySQL for targeted attacks on enterprise

Estimated reading time: 7 minutes

In today’s world data is everything, and to store and process this large amount of data, everyone started using computing devices. Database servers which are used for storing this precious data on computing devices include MySQL, MongoDB, MSSQL, etc....
Read Blog
May 28, 2019
← Previous 1 2
Featured Authors
  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director of Quick Heal Technologies...

    Read more..
  • Mahua Chakrabarthy
    Mahua Chakrabarthy

    A tea connoisseur who firmly believes that life is too short for dull content....

    Read more..
Topics
apt (19) Cyber-attack (35) cyber-attacks (58) cyberattack (16) cyberattacks (13) Cybersecurity (322) cyber security (31) Cyber threat (33) cyber threats (48) Data (11) data breach (55) data breaches (28) data loss (28) data loss prevention (34) data privacy (11) data protection (24) data security (15) DLP (49) Encryption (16) endpoint security (107) Enterprise security (17) Exploit (14) firewall (11) GDPR (12) hackers (11) malware (76) malware attack (23) malware attacks (12) MDM (25) Microsoft (15) Network security (22) Patch Management (12) phishing (27) Ransomware (67) ransomware attack (30) ransomware attacks (30) ransomware protection (13) security (11) Seqrite (33) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (16) windows (11)
Loading
Resources
  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies
About Us
  • About Seqrite
  • Leadership
  • Awards & Certifications
  • Newsroom
Archives
  • By Date
  • By Category
Loading

© 2025 Quick Heal Technologies Ltd. Cookie Policies Privacy Policies