• News
  • Security
  • Products
  • About Seqrite
Blogs on Information Technology, Network & Cybersecurity | Seqrite Blog
  • News
  • Security
  • Products
  • About Seqrite

Tag: Cybersecurity

Beyond Passwords: Is Your System Truly Secure?

Beyond Passwords: Is Your System Truly Secure?

Estimated reading time: 3 minutes

Beyond Passwords: Is Your System Truly Secure? The cybersecurity landscape is constantly evolving, with traditional methods of securing user accounts—such as passwords—proving increasingly inadequate against the growing sophistication of cyberattacks. In response, authentication systems that go Beyond Passwords, i.e.,...
Read Blog
March 12, 2025

Digital Arrest Scam in India: How Cyber Criminals Exploit Fear to Deceive Victims

Digital Arrest Scam in India:  How Cyber Criminals Exploit Fear to Deceive Victims

Estimated reading time: 3 minutes

Cyber criminals in India are constantly evolving their tactics to exploit fear and trust. One alarming trend is the “Digital Arrest Scam,” where fraudsters impersonate law enforcement agencies or government officials to extort money or sensitive information. These scams...
Read Blog
February 28, 2025

Fake CAPTCHA Lures Victims: Lumma Stealer Abuses Clipboard and PowerShell

Fake CAPTCHA Lures Victims: Lumma Stealer Abuses Clipboard and PowerShell

Estimated reading time: 6 minutes

Fake CAPTCHA Lures Victims: Lumma Stealer Abuses Clipboard and PowerShell Introduction: We recently identified a new malware campaign using fake CAPTCHA pages to deliver Lumma Stealer, an infostealer operating under the malware-as-a-service (MaaS) model, first discovered in 2022. In...
Read Blog
February 25, 2025

The ROI of Implementing a ZTNA solution

The ROI of Implementing a ZTNA solution

Estimated reading time: 3 minutes

In today’s digital landscape, where cyber threats are evolving rapidly, organizations must rethink their approach to network security. Traditional security models, such as VPNs and perimeter-based defenses, are no longer sufficient to protect against sophisticated cyberattacks. This is where...
Read Blog
February 24, 2025

Draft DPDPA Guidelines: What’s in it for Cybersecurity Leaders?

Draft DPDPA Guidelines: What’s in it for Cybersecurity Leaders?

Estimated reading time: 3 minutes

The Digital Personal Data Protection Act (DPDPA) is poised to redefine India’s cybersecurity and data protection landscape. The recent draft guidelines have sparked widespread discussions, especially among cybersecurity leaders responsible for safeguarding data and ensuring compliance. This blog explores...
Read Blog
January 10, 2025

5th January and The Tale of Joshi Virus: India’s First Global Computer Virus

5th January and The Tale of Joshi Virus: India’s First Global Computer Virus

Estimated reading time: 3 minutes

In the cinematic tapestry of cybersecurity, where tales of intrigue and innovation collide, one story emerges from the shadows of the past. It’s a story that began in the early 1990s, during the DOS era, when computer viruses were...
Read Blog
December 26, 2024

Seqrite XDR Awarded AV-TEST Approved Advanced EDR Certification. Here’s Why?

Seqrite XDR Awarded AV-TEST Approved Advanced EDR Certification. Here’s Why?

Estimated reading time: 4 minutes

Seqrite XDR Awarded AV-TEST Approved Advanced EDR Certification. Here’s Why? In today’s rapidly evolving cybersecurity landscape, enterprises face an onslaught of sophisticated threats that can evade traditional security measures. From stealthy malware to advanced persistent threats (APTs), the arsenal...
Read Blog
October 10, 2024

Preparing the Manufacturing Industry for New Age Cyber Attacks

Preparing the Manufacturing Industry for New Age Cyber Attacks

Estimated reading time: 3 minutes

‍In today’s interconnected world, the manufacturing industry is increasingly vulnerable to cyber-attacks. Recent incidents, such as the cyber attack on Suzuki motorcycles and the impact on billion-dollar companies like NVIDIA and Colonial Pipeline, highlight the devastating consequences of these...
Read Blog
March 29, 2024

Cyber Security in Automotive Supply Chain: Challenges and Solutions

Cyber Security in Automotive Supply Chain: Challenges and Solutions

Estimated reading time: 3 minutes

‍The first India Cyber Threat Report 2023 revealed the automotive supply chain as the most cyberattacked sector. Over the past three to four years, the global adoption of Industry 4.0 has marked a transformative trend, witnessing extensive digitalization integration...
Read Blog
February 8, 2024

Cloud Security Under Siege: Fortify Your Defences Against Emerging Threats

Cloud Security Under Siege: Fortify Your Defences Against Emerging Threats

Estimated reading time: 3 minutes

Can the cloud be hacked? Yes, and when the cloud is hacked – it is not just data at risk! The emerging digital ecosystem is treacherous. Today, every company, whether large or small, is a reachable target with operations,...
Read Blog
September 5, 2023
← Previous 1 2 3 … 33 Next →
Featured Authors
  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director of Quick Heal Technologies...

    Read more..
  • Mahua Chakrabarthy
    Mahua Chakrabarthy

    A tea connoisseur who firmly believes that life is too short for dull content....

    Read more..
Topics
apt (20) Cyber-attack (36) cyber-attacks (58) cyberattack (16) cyberattacks (13) Cybersecurity (324) cyber security (33) Cyber threat (33) cyber threats (48) Data (11) data breach (55) data breaches (28) data loss (28) data loss prevention (34) data privacy (12) data protection (25) data security (15) DLP (49) Encryption (16) endpoint security (108) Enterprise security (17) Exploit (14) firewall (11) GDPR (12) hackers (11) malware (76) malware attack (23) malware attacks (12) MDM (25) Microsoft (15) Network security (22) Patch Management (12) phishing (27) Ransomware (67) ransomware attack (30) ransomware attacks (30) ransomware protection (14) security (11) Seqrite (33) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (17) windows (11)
Loading
Resources
  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies
About Us
  • About Seqrite
  • Leadership
  • Awards & Certifications
  • Newsroom
Archives
  • By Date
  • By Category
Loading

© 2025 Quick Heal Technologies Ltd. Cookie Policies Privacy Policies