• News
  • Security
  • Products
  • About Seqrite
Blogs on Information Technology, Network & Cybersecurity | Seqrite Blog
  • News
  • Security
  • Products
  • About Seqrite

Tag: Cyber-attack

Kimsuky: A Continuous Threat to South Korea with Deceptive Tactics

Kimsuky: A Continuous Threat to South Korea with Deceptive Tactics

Estimated reading time: 8 minutes

Kimsuky: A Continuous Threat to South Korea with Deceptive Tactics Contents Introduction Infection Chain Initial Findings Campaign 1 Looking into PDF document. Campaign 2 Looking into PDF document. Technical Analysis Campaign 1 & 2 Conclusion Seqrite Protection MITRE ATT&CK...
Read Blog
April 4, 2025

New Steganographic Campaign Distributing Multiple Malware

New Steganographic Campaign Distributing Multiple Malware

Estimated reading time: 7 minutes

New Steganographic Campaign Distributing Multiple Malware Recently we have observed multiple stealer malware such as Remcos, DcRAT,AgentTesla, VIPKeyLogger, etc. distributed through a steganographic campaign.  On tracing the roots, the campaign has been around for a while but has not...
Read Blog
March 17, 2025

Fake CAPTCHA Lures Victims: Lumma Stealer Abuses Clipboard and PowerShell

Fake CAPTCHA Lures Victims: Lumma Stealer Abuses Clipboard and PowerShell

Estimated reading time: 6 minutes

Fake CAPTCHA Lures Victims: Lumma Stealer Abuses Clipboard and PowerShell Introduction: We recently identified a new malware campaign using fake CAPTCHA pages to deliver Lumma Stealer, an infostealer operating under the malware-as-a-service (MaaS) model, first discovered in 2022. In...
Read Blog
February 25, 2025

Why ensuring employees with cyber hygiene is important for all organizations?

Why ensuring employees with cyber hygiene is important for all organizations?

Estimated reading time: 2 minutes

Current times have witnessed a large percentage of cyber breaches resulting from human errors. For example, the famous WannaCry ransomware attack that affected the entire world in 2017 increased due to negligence of security teams in ensuring  if the...
Read Blog
May 12, 2021

Snake Ransomware brings impending doom to enterprise networks

Snake Ransomware brings impending doom to enterprise networks

Estimated reading time: 4 minutes

New targeted ransomware called SNAKE or EKANS was found in early January. Malware is written in the Go language and it is heavily obfuscated and goes after ICS environments. Snake Ransomware seems to be distributed via a focused and...
Read Blog
July 10, 2020

Attacker uses tricky technique of Excel 4.0 in Malspam campaign

Attacker uses tricky technique of Excel 4.0 in Malspam campaign

Estimated reading time: 4 minutes

Use of Phishing emails is not new for cyber-attack and is still one of the classic strategies to compromise a victim’s machine. Cyber criminals lure victims to open email attachments (mostly Doc and XLS files) by faking them to...
Read Blog
November 2, 2019

Cost of security vs. Cost of cyber attack: Which one should you choose?

Cost of security vs. Cost of cyber attack: Which one should you choose?

Estimated reading time: 3 minutes

As the number and nature of cyber threats grows increasingly day by day, organizations have opened up to the threat caused by cyber attacks. The North Atlantic Treaty Organization, which is better known as NATO, recognized cyberspace as a...
Read Blog
May 24, 2018
10
Shares

Here’s the checklist of an efficient endpoint security solution

Here’s the checklist of an efficient endpoint security solution

Estimated reading time: 3 minutes

For any organization, big or small, endpoint security acts as a frontline against cyber attacks. Ultimately, endpoints refer to every device that is connected to the enterprise network. Most attacks on an organization can be traced back to devices...
Read Blog
April 25, 2018
4
Shares

What not to do if your business is the victim of a cyber attack

What not to do if your business is the victim of a cyber attack

Estimated reading time: 3 minutes

It is not a situation any network administrator ever wants to be in. Yet, considering the multitude of attacks nowadays, the possibility of being in such a situation is getting more and more likely. The last year has shown...
Read Blog
February 28, 2018
7
Shares

State-sponsored cyber attacks: New-age warfare

State-sponsored cyber attacks: New-age warfare

Estimated reading time: 3 minutes

The latest form that war between two countries has taken is cyber attacks. Simply put, a cyber attack is a deliberate exploitation of computer systems, technology-dependent enterprises and networks. While, no clear definition of cyber attack has yet been...
Read Blog
February 27, 2018
16
Shares
1 2 … 4 Next →
Featured Authors
  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director of Quick Heal Technologies...

    Read more..
  • Mahua Chakrabarthy
    Mahua Chakrabarthy

    A tea connoisseur who firmly believes that life is too short for dull content....

    Read more..
Topics
apt (19) Cyber-attack (35) cyber-attacks (58) cyberattack (16) cyberattacks (13) Cybersecurity (322) cyber security (31) Cyber threat (33) cyber threats (48) Data (11) data breach (55) data breaches (28) data loss (28) data loss prevention (34) data privacy (11) data protection (24) data security (15) DLP (49) Encryption (16) endpoint security (107) Enterprise security (17) Exploit (14) firewall (11) GDPR (12) hackers (11) malware (76) malware attack (23) malware attacks (12) MDM (25) Microsoft (15) Network security (22) Patch Management (12) phishing (27) Ransomware (67) ransomware attack (30) ransomware attacks (30) ransomware protection (13) security (11) Seqrite (33) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (16) windows (11)
Loading
Resources
  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies
About Us
  • About Seqrite
  • Leadership
  • Awards & Certifications
  • Newsroom
Archives
  • By Date
  • By Category
Loading

© 2025 Quick Heal Technologies Ltd. Cookie Policies Privacy Policies