• News
  • Security
  • Products
  • About Seqrite
Blogs on Information Technology, Network & Cybersecurity | Seqrite Blog
  • News
  • Security
  • Products
  • About Seqrite

Tag: cyber-attacks

Ransomware Attack Over Publicly Shared SMB2 Connections and Staying Protected with Seqrite

Ransomware Attack Over Publicly Shared SMB2 Connections and Staying Protected with Seqrite

Estimated reading time: 3 minutes

Ransomware Attack Over Publicly Shared SMB2 Connections and Staying Protected with Seqrite Ransomware continues to evolve as one of the most devastating cybersecurity threats, and attackers are finding new ways to exploit vulnerabilities. One such method involves targeting publicly...
Read Blog
March 11, 2025

How Attackers Exploit BitLocker: Turning Legitimate Tools into Ransomware Weapons

How Attackers Exploit BitLocker: Turning Legitimate Tools into Ransomware Weapons

Estimated reading time: 3 minutes

How Attackers Exploit BitLocker: Turning Legitimate Tools into Ransomware Weapons Introduction The ransomware landscape is evolving rapidly, with attackers constantly refining their techniques to outwit security defenses. One alarming trend is the weaponization of trusted tools like Microsoft’s BitLocker....
Read Blog
March 11, 2025

Java RAT Campaign Targets Co-Operative Banks in India

Java RAT Campaign Targets Co-Operative Banks in India

Estimated reading time: 8 minutes

Summary While the entire world is busy fighting COVID-19 pandemic, cybercriminals have latched onto the opportunity and used the theme to propagate numerous cyber-attacks. The latest in line is a targeted attack against co-operative banks in India. In April...
Read Blog
May 12, 2020

Seqrite UTM : Security Weapon Against Man In The Middle Attacks

Seqrite UTM : Security Weapon Against Man In The Middle Attacks

Estimated reading time: 6 minutes

As implied in the name itself, Man In The Middle Attack is a type of attack where a illegal person tries to intercept the communication between two parties. Either to secretly overhear or to steal the critical data being...
Read Blog
December 3, 2019

Email-borne cyber attacks: A constant security threat

Email-borne cyber attacks: A constant security threat

Estimated reading time: 3 minutes

Since the invention of the World Wide Web in 1989 by Tim Berners-Lee, the technology has changed. What used to be a collection of simple text-based Usenet groups metamorphosed into multimedia and graphics. First email communication was all the...
Read Blog
July 12, 2018
5
Shares

Back up can be your biggest business investment

Back up can be your biggest business investment

Estimated reading time: 3 minutes

In 2018, the line between physical and digital world is increasingly blurring. Today, no business can solely operate in just the physical sphere. The emergence of connected technologies means every company, big or small, has some digital functions. No doubt, the...
Read Blog
March 30, 2018
9
Shares

Why you should never pay ransom to hackers

Why you should never pay ransom to hackers

Estimated reading time: 3 minutes

Since WannaCry swept the world in 2017, ransomware has become a network administrator’s worst nightmare. It’s not without any reason: the devastating WannaCry ransomware attack affected more than 200,000 computers across 150 countries with huge damages. Other notable ransomware attacks...
Read Blog
February 8, 2018
7
Shares

Cryptomining Malware: The New Favorite of Hackers

Cryptomining Malware: The New Favorite of Hackers

Estimated reading time: 3 minutes

Ransomware threats have long been plaguing the online space and are usually considered to be extremely disruptive in nature. Unlike other malware threats which keep a low profile, ransomware attacks announce themselves before crippling a system for diverse benefits....
Read Blog
February 7, 2018
4
Shares

Cryptocurrency- The Good, The Bad & The Ugly

Cryptocurrency- The Good, The Bad & The Ugly

Estimated reading time: 3 minutes

Cryptocurrency is the current buzzword of this day and age. Not a day goes by when there’s not a news item about cryptocurrency, either with warnings about its danger or breathless coverage of its fluctuating value. Without doubt, it’s...
Read Blog
February 6, 2018
4
Shares

Cybersecurity: How to approach a broader perspective at the board level

Cybersecurity: How to approach a broader perspective at the board level

Estimated reading time: 3 minutes

The dangers that cyber threats pose have never been as apparent as now. High-profile organizations have been at the receiving end, there has been both reputational and financial damage and brand equity has been hit. One thing is clear:...
Read Blog
January 30, 2018
9
Shares
1 2 … 6 Next →
Featured Authors
  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director of Quick Heal Technologies...

    Read more..
  • Mahua Chakrabarthy
    Mahua Chakrabarthy

    A tea connoisseur who firmly believes that life is too short for dull content....

    Read more..
Topics
apt (19) Cyber-attack (35) cyber-attacks (58) cyberattack (16) cyberattacks (13) Cybersecurity (322) cyber security (31) Cyber threat (33) cyber threats (48) Data (11) data breach (55) data breaches (28) data loss (28) data loss prevention (34) data privacy (11) data protection (24) data security (15) DLP (49) Encryption (16) endpoint security (107) Enterprise security (17) Exploit (14) firewall (11) GDPR (12) hackers (11) malware (76) malware attack (23) malware attacks (12) MDM (25) Microsoft (15) Network security (22) Patch Management (12) phishing (27) Ransomware (67) ransomware attack (30) ransomware attacks (30) ransomware protection (13) security (11) Seqrite (33) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (16) windows (11)
Loading
Resources
  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies
About Us
  • About Seqrite
  • Leadership
  • Awards & Certifications
  • Newsroom
Archives
  • By Date
  • By Category
Loading

© 2025 Quick Heal Technologies Ltd. Cookie Policies Privacy Policies