• News
  • Security
  • Products
  • About Seqrite
Blogs on Information Technology, Network & Cybersecurity | Seqrite Blog
  • News
  • Security
  • Products
  • About Seqrite

Cybersecurity Archive

CVE-2022-26134: Actively Exploited Atlassian OGNL Injection Zero-Day Vulnerability

CVE-2022-26134: Actively Exploited Atlassian OGNL Injection Zero-Day Vulnerability

Estimated reading time: 4 minutes

On June 2, 2022, CVE-2022-26134 “Confluence,” a zero-day remote code execution vulnerability, was discovered in all versions of the Confluence Server and Data Center. The attack was detected to be of high severity (CVSS:9.0/10.0) according to a security advisory...
Read More
July 5, 2022

Metaverse and the Cybersecurity: Evolving Security into the Latest Digital Universe

Metaverse and the Cybersecurity: Evolving Security into the Latest Digital Universe

Estimated reading time: 3 minutes

We are seeing the beginning of a space-age of digital exploration. Even though the Metaverse may be a buzz nowadays, it is an idea that is earning huge attention all over the globe. Supposing widespread adoption will change how...
Read More
March 29, 2022

Seqrite EPS accredited with “Advanced Approved Endpoint Protection” for protection against complex ransomware attacks

Seqrite EPS accredited with “Advanced Approved Endpoint Protection” for protection against complex ransomware attacks

Estimated reading time: 2 minutes

Enterprises are no longer safe from dangerous and expensive ransomware attacks in modern times. It can enter an organization through multiple vectors, such as email spam, phishing attacks, or malicious web downloads. For the highest level of protection, organizations...
Read More
January 3, 2022

CVE-2021-44228: New Apache Log4j ‘Log4Shell’ Zero-Day Being Exploited in the Wild

CVE-2021-44228: New Apache Log4j ‘Log4Shell’ Zero-Day Being Exploited in the Wild

Estimated reading time: 3 minutes

A critical zero-day vulnerability (CVE-2021-44228) recently discovered Apache Log4J, the popular java open source logging library used in countless worldwide applications. The maximum severity vulnerability has been identified as ‘Log4Shell’, which, if exploited, could permit a remote attacker to...
Read More
December 15, 2021

Top 6 cybersecurity threats that every Startup or Business should have to be ready to fight in current times

Top 6 cybersecurity threats that every Startup or Business should have to be ready to fight in current times

Estimated reading time: 4 minutes

If you’ve been following the news recently, you’ll undoubtedly have read about cybersecurity incidents impacting corporations of all sizes in all industries around the world. While it doesn’t often make the news, even small- and medium-sized businesses (SMBs) have...
Read More
December 3, 2021

Seqrite Endpoint Security Cloud Supports Windows 10 21H2 Version

Seqrite Endpoint Security Cloud Supports Windows 10 21H2 Version

Estimated reading time: 2 minutes

Microsoft has recently developed a new feature update for Windows 10 PCs, Windows 10, version 21H2 (Windows 10 21H2). This article highlights some of the new features of Windows 10 21H2 and how Seqrite Endpoint Security Cloud is compatible...
Read More
November 17, 2021

Seqrite Endpoint Security Supports Windows 10 Feature Update Version 21H2

Seqrite Endpoint Security Supports Windows 10 Feature Update Version 21H2

Estimated reading time: 1 minute

Microsoft has recently developed a new feature update for Windows 10 PCs, Windows 10, version 21H2 (Windows 10 21H2). This article highlights some of the new features of Windows 10 21H2 and how Seqrite Endpoint Security (EPS) is compatible...
Read More
November 17, 2021

Multi-Staged JSOutProx RAT Targets Indian Co-Operative Banks and Finance Companies

Multi-Staged JSOutProx RAT Targets Indian Co-Operative Banks and Finance Companies

Estimated reading time: 7 minutes

  Quick Heal Security Labs has been monitoring various attack campaigns using JSOutProx RAT against different SMBs in the BFSI sector since January 2021. We have found multiple payloads being dropped at different stages of its operations. Although the...
Read More
October 22, 2021

Seqrite Endpoint Security Cloud Supports Windows 11

Seqrite Endpoint Security Cloud Supports Windows 11

Estimated reading time: 1 minute

Microsoft has released an all-new Windows 11 Operating System (OS). This article highlights some of the new features of Windows 11 and how Seqrite Endpoint Security Cloud is compatible with Windows 11. Few highlights of Windows 11 Windows11 has...
Read More
October 8, 2021

Seqrite Endpoint Security Supports the Latest Windows 11 Release

Seqrite Endpoint Security Supports the Latest Windows 11 Release

Estimated reading time: 1 minute

Microsoft has released an all-new Windows 11 Operating System (OS). This article highlights some of the new features of Windows 11 and how Seqrite Endpoint Security (EPS) is compatible with Windows 11. Few highlights of Windows 11 Windows11 has...
Read More
October 5, 2021
1 2 … 31 Next →
Popular Posts
  • 5 Security measures you should take to protect your organization’s network 5 Security measures you should take to protect your organization’s network August 11, 2017
  • Benefits of having Intrusion Prevention/Detection System in your enterprise Benefits of having Intrusion Prevention/Detection System in your enterprise February 15, 2018
  • Uncovering LockBit Black’s Attack Chain and Anti-forensic activity Uncovering LockBit Black’s Attack Chain and Anti-forensic activity February 1, 2023
Featured Authors
  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director and Chief Technology Officer of...

    Read more..
  • Jayesh Kulkarni
    Jayesh Kulkarni

    Jayesh is working as a Security Researcher for a couple of years. He likes to...

    Read more..
Stay Updated!
Topics
apt (11) Cyber-attack (32) cyber-attacks (56) cyberattack (11) cyberattacks (12) Cybersecurity (301) cyber security (26) Cyber threat (29) cyber threats (44) Data (11) data breach (50) data breaches (27) data loss (28) data loss prevention (33) data protection (21) data security (13) DLP (49) Encryption (16) endpoint security (103) Enterprise security (15) EPS (10) Exploit (12) firewall (11) hackers (11) IoT (10) malware (64) malware attack (23) malware attacks (12) MDM (25) Microsoft (14) Network security (18) Patch Management (12) phishing (18) Ransomware (60) ransomware attack (29) ransomware attacks (30) ransomware protection (12) security (10) Seqrite (26) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (15) windows (11)
Products
  • Seqrite MSSP Portal
  • HawkkScan
  • HawkkProtect
  • HawkkHunt XDR
  • HawkkEye
  • HawkkEye Endpoint Security Cloud
  • HawkkEye mSuite
  • HawkkEye Workspace
  • Endpoint Security (EPS)
  • Unified Threat Management
  • Antivirus for Server
  • Antivirus for Linux
Resources
  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies
About Us
  • Company Overview
  • Leadership
  • Why choose SEQRITE?
  • Awards & Certifications
  • Newsroom
Archives
  • By Date
  • By Category

© 2022 Quick Heal Technologies Ltd. Cookie Policies Privacy Policies

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website.
By browsing this website, you agree to our cookie policy.