• News
  • Security
  • Products
  • About Seqrite
Blogs on Information Technology, Network & Cybersecurity | Seqrite Blog
  • News
  • Security
  • Products
  • About Seqrite

Tag: Cybersecurity

How Seqrite Endpoint Protection Blocks Non-Human Threats like Bots, Scripts, and Malware

How Seqrite Endpoint Protection Blocks Non-Human Threats like Bots, Scripts, and Malware

Estimated reading time: 4 minutes

How Seqrite Endpoint Protection Blocks Non-Human Threats like Bots, Scripts, and Malware In today’s hyper-connected digital world, the cybersecurity landscape is shifting dramatically. Gone are the days when cyberattacks primarily relied on human intervention. We’re now facing a new...
Read Blog
June 9, 2025

5 Benefits of Generative AI in Extended Detection and Response (XDR)

5 Benefits of Generative AI in Extended Detection and Response (XDR)

Estimated reading time: 2 minutes

5 Benefits of Generative AI in Extended Detection and Response (XDR) Generative Artificial Intelligence (GenAI) is transforming cybersecurity by enhancing Extended Detection and Response (XDR) systems, which integrate data from multiple security layers to provide comprehensive threat detection and...
Read Blog
May 26, 2025

Market Guide for Choosing the Right ZTNA Solution

Market Guide for Choosing the Right ZTNA Solution

Estimated reading time: 3 minutes

As organizations continue to embrace hybrid work models and migrate applications to the cloud, traditional network security approaches like VPNs are proving inadequate. Zero-trust network Access (ZTNA) has emerged as the modern framework for secure access, operating on the...
Read Blog
May 14, 2025

Unveiling Swan Vector APT Targeting Taiwan and Japan with varied DLL Implants

Unveiling Swan Vector APT Targeting Taiwan and Japan with varied DLL Implants

Estimated reading time: 14 minutes

Unveiling Swan Vector APT Targeting Taiwan and Japan with varied DLL implants. Introduction Initial Findings. Looking into the decoy. Infection Chain. Technical Analysis. Stage 1 – Malicious LNK Script. Stage 2 – Malicious Pterois Implant. Stage 3 – Malicious...
Read Blog
May 12, 2025

Security Flaw in Yelp Help Viewer (CVE-2025-3155)

Security Flaw in Yelp Help Viewer (CVE-2025-3155)

Estimated reading time: 4 minutes

Security Flaw in Yelp Help Viewer (CVE-2025-3155) Yelp is the default help browser in GNOME-based Linux distributions, including widely used systems such as Ubuntu, Fedora and Debian etc. It is responsible for rendering help documentation written in the Mallard...
Read Blog
May 12, 2025

EDR vs XDR: Understanding the Differences and Choosing the Right Solution

EDR vs XDR: Understanding the Differences and Choosing the Right Solution

Estimated reading time: 4 minutes

EDR vs XDR: Understanding the Differences and Choosing the Right Solution In today’s rapidly evolving cyber landscape, organizations face an increasing number of sophisticated threats. Consequently, the need for robust cybersecurity measures has never been more critical. Two prominent...
Read Blog
April 9, 2025

Kimsuky: A Continuous Threat to South Korea with Deceptive Tactics

Kimsuky: A Continuous Threat to South Korea with Deceptive Tactics

Estimated reading time: 8 minutes

Kimsuky: A Continuous Threat to South Korea with Deceptive Tactics Contents Introduction Infection Chain Initial Findings Campaign 1 Looking into PDF document. Campaign 2 Looking into PDF document. Technical Analysis Campaign 1 & 2 Conclusion Seqrite Protection MITRE ATT&CK...
Read Blog
April 4, 2025

Operation HollowQuill: Malware delivered into Russian R&D Networks via Research Decoy PDFs

Estimated reading time: 10 minutes

Operation HollowQuill: Malware delivered into Russian R&D Networks via Research Decoy PDFs. Contents Introduction Key Targets Industries Affected Geographical Focus Infection Chain Initial Findings Looking into the decoy-document Technical Analysis Stage 1 – Malicious RAR File Stage 2 –...
Read Blog
March 31, 2025

QR Code Phishing (Quishing) Attacks: How to Spot & Prevent Them

QR Code Phishing (Quishing) Attacks: How to Spot & Prevent Them

Estimated reading time: 6 minutes

The Rising Threat of QR Code-Driven Phishing Schemes A new kind of cyberattack has emerged in recent years as a result of QR codes’ popularity as a quick and easy way to share information. Businesses are increasingly at risk...
Read Blog
March 18, 2025

New Steganographic Campaign Distributing Multiple Malware

New Steganographic Campaign Distributing Multiple Malware

Estimated reading time: 7 minutes

New Steganographic Campaign Distributing Multiple Malware Recently we have observed multiple stealer malware such as Remcos, DcRAT,AgentTesla, VIPKeyLogger, etc. distributed through a steganographic campaign.  On tracing the roots, the campaign has been around for a while but has not...
Read Blog
March 17, 2025
1 2 … 33 Next →
Featured Authors
  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director of Quick Heal Technologies...

    Read more..
  • Mahua Chakrabarthy
    Mahua Chakrabarthy

    A tea connoisseur who firmly believes that life is too short for dull content....

    Read more..
Topics
apt (20) Cyber-attack (36) cyber-attacks (58) cyberattack (16) cyberattacks (13) Cybersecurity (324) cyber security (33) Cyber threat (33) cyber threats (48) Data (11) data breach (55) data breaches (28) data loss (28) data loss prevention (34) data privacy (12) data protection (25) data security (15) DLP (49) Encryption (16) endpoint security (108) Enterprise security (17) Exploit (14) firewall (11) GDPR (12) hackers (11) malware (76) malware attack (23) malware attacks (12) MDM (25) Microsoft (15) Network security (22) Patch Management (12) phishing (27) Ransomware (67) ransomware attack (30) ransomware attacks (30) ransomware protection (14) security (11) Seqrite (33) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (17) windows (11)
Loading
Resources
  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies
About Us
  • About Seqrite
  • Leadership
  • Awards & Certifications
  • Newsroom
Archives
  • By Date
  • By Category
Loading

© 2025 Quick Heal Technologies Ltd. Cookie Policies Privacy Policies