• News
  • Security
  • Products
  • About Seqrite
Blogs on Information Technology, Network & Cybersecurity | Seqrite Blog
  • News
  • Security
  • Products
  • About Seqrite

Tag: Cyber threat

Kimsuky: A Continuous Threat to South Korea with Deceptive Tactics

Kimsuky: A Continuous Threat to South Korea with Deceptive Tactics

Estimated reading time: 8 minutes

Kimsuky: A Continuous Threat to South Korea with Deceptive Tactics Contents Introduction Infection Chain Initial Findings Campaign 1 Looking into PDF document. Campaign 2 Looking into PDF document. Technical Analysis Campaign 1 & 2 Conclusion Seqrite Protection MITRE ATT&CK...
Read Blog
April 4, 2025

SnakeKeylogger: A Multistage Info Stealer Malware Campaign

SnakeKeylogger: A Multistage Info Stealer Malware Campaign

Estimated reading time: 6 minutes

SnakeKeylogger – A Multistage Info Stealer Malware Campaign Info-stealer malware has become a growing threat, with attackers constantly refining their techniques to evade detection. Among these threats, SnakeKeylogger has emerged as one of the highly active credential-stealing malware, targeting...
Read Blog
March 25, 2025

Fake CAPTCHA Lures Victims: Lumma Stealer Abuses Clipboard and PowerShell

Fake CAPTCHA Lures Victims: Lumma Stealer Abuses Clipboard and PowerShell

Estimated reading time: 6 minutes

Fake CAPTCHA Lures Victims: Lumma Stealer Abuses Clipboard and PowerShell Introduction: We recently identified a new malware campaign using fake CAPTCHA pages to deliver Lumma Stealer, an infostealer operating under the malware-as-a-service (MaaS) model, first discovered in 2022. In...
Read Blog
February 25, 2025

How to Avoid Falling for Fake Emails like “You Have Been Under Surveillance”

How to Avoid Falling for Fake Emails like “You Have Been Under Surveillance”

Estimated reading time: 3 minutes

How to Avoid Falling for Fake Emails like “You Have Been Under Surveillance” A recent email scam titled “You Have Been Under Surveillance” is a classic example of a sextortion scam. These scams involve cybercriminals threatening to expose sensitive...
Read Blog
July 4, 2024

Email could be one of the simplest ways for hackers to breach your organization

Email could be one of the simplest ways for hackers to breach your organization

Estimated reading time: 3 minutes

What is common between Sarah Palin, George HW Bush, and John Podesta? Apart from being important political figures in the United States, there’s another fact that unites them – they’ve all been victims of messy email hacks. Sometimes, danger...
Read Blog
July 9, 2019

What not to do if your business is the victim of a cyber attack

What not to do if your business is the victim of a cyber attack

Estimated reading time: 3 minutes

It is not a situation any network administrator ever wants to be in. Yet, considering the multitude of attacks nowadays, the possibility of being in such a situation is getting more and more likely. The last year has shown...
Read Blog
February 28, 2018
7
Shares

Small businesses are underestimating cyber attacks

Small businesses are underestimating cyber attacks

Estimated reading time: 3 minutes

A cursory look at the cybersecurity landscape in 2017 throws up some of the biggest names in their respective industries. From Uber to Yahoo to Equifax to India’s Zomato and lots more, it seemed even the biggest companies in the...
Read Blog
February 16, 2018
14
Shares
4

Data Security: Where are the SMBs failing in securing their data

Data Security: Where are the SMBs failing in securing their data

Estimated reading time: 3 minutes

Small and medium sized businesses usually rely on organizational data for flourishing and succeeding in their endeavors. However, there are chances that the SMBs are putting all their data at risk by implementing erroneous strategies.  According to the latest...
Read Blog
February 9, 2018
12
Shares

Why you should never pay ransom to hackers

Why you should never pay ransom to hackers

Estimated reading time: 3 minutes

Since WannaCry swept the world in 2017, ransomware has become a network administrator’s worst nightmare. It’s not without any reason: the devastating WannaCry ransomware attack affected more than 200,000 computers across 150 countries with huge damages. Other notable ransomware attacks...
Read Blog
February 8, 2018
7
Shares

Asset Management: Protecting your company’s most important assets

Asset Management: Protecting your company’s most important assets

Estimated reading time: 3 minutes

A comprehensive IT Asset Management (ITAM) program facilitates an accurate, documented IT environment covering the organization’s assets and data along with their owners and highlighting security and risks across the network. It helps to make critical decisions regarding software...
Read Blog
January 29, 2018
8
Shares
1 2 … 4 Next →
Featured Authors
  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director of Quick Heal Technologies...

    Read more..
  • Mahua Chakrabarthy
    Mahua Chakrabarthy

    A tea connoisseur who firmly believes that life is too short for dull content....

    Read more..
Topics
apt (19) Cyber-attack (35) cyber-attacks (58) cyberattack (16) cyberattacks (13) Cybersecurity (322) cyber security (31) Cyber threat (33) cyber threats (48) Data (11) data breach (55) data breaches (28) data loss (28) data loss prevention (34) data privacy (11) data protection (24) data security (15) DLP (49) Encryption (16) endpoint security (107) Enterprise security (17) Exploit (14) firewall (11) GDPR (12) hackers (11) malware (76) malware attack (23) malware attacks (12) MDM (25) Microsoft (15) Network security (22) Patch Management (12) phishing (27) Ransomware (67) ransomware attack (30) ransomware attacks (30) ransomware protection (13) security (11) Seqrite (33) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (16) windows (11)
Loading
Resources
  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies
About Us
  • About Seqrite
  • Leadership
  • Awards & Certifications
  • Newsroom
Archives
  • By Date
  • By Category
Loading

© 2025 Quick Heal Technologies Ltd. Cookie Policies Privacy Policies