• News
  • Security
  • Products
  • About Seqrite
Blogs on Information Technology, Network & Cybersecurity | Seqrite Blog
  • News
  • Security
  • Products
  • About Seqrite

Tag: Cybersecurity

QR Code Phishing (Quishing) Attacks: How to Spot & Prevent Them

QR Code Phishing (Quishing) Attacks: How to Spot & Prevent Them

Estimated reading time: 6 minutes

The Rising Threat of QR Code-Driven Phishing Schemes A new kind of cyberattack has emerged in recent years as a result of QR codes’ popularity as a quick and easy way to share information. Businesses are increasingly at risk...
Read Blog
March 18, 2025

New Steganographic Campaign Distributing Multiple Malware

New Steganographic Campaign Distributing Multiple Malware

Estimated reading time: 7 minutes

New Steganographic Campaign Distributing Multiple Malware Recently we have observed multiple stealer malware such as Remcos, DcRAT,AgentTesla, VIPKeyLogger, etc. distributed through a steganographic campaign.  On tracing the roots, the campaign has been around for a while but has not...
Read Blog
March 17, 2025

Beyond Passwords: Is Your System Truly Secure?

Beyond Passwords: Is Your System Truly Secure?

Estimated reading time: 3 minutes

Beyond Passwords: Is Your System Truly Secure? The cybersecurity landscape is constantly evolving, with traditional methods of securing user accounts—such as passwords—proving increasingly inadequate against the growing sophistication of cyberattacks. In response, authentication systems that go Beyond Passwords, i.e.,...
Read Blog
March 12, 2025

Digital Arrest Scam in India: How Cyber Criminals Exploit Fear to Deceive Victims

Digital Arrest Scam in India:  How Cyber Criminals Exploit Fear to Deceive Victims

Estimated reading time: 3 minutes

Cyber criminals in India are constantly evolving their tactics to exploit fear and trust. One alarming trend is the “Digital Arrest Scam,” where fraudsters impersonate law enforcement agencies or government officials to extort money or sensitive information. These scams...
Read Blog
February 28, 2025

Fake CAPTCHA Lures Victims: Lumma Stealer Abuses Clipboard and PowerShell

Fake CAPTCHA Lures Victims: Lumma Stealer Abuses Clipboard and PowerShell

Estimated reading time: 6 minutes

Fake CAPTCHA Lures Victims: Lumma Stealer Abuses Clipboard and PowerShell Introduction: We recently identified a new malware campaign using fake CAPTCHA pages to deliver Lumma Stealer, an infostealer operating under the malware-as-a-service (MaaS) model, first discovered in 2022. In...
Read Blog
February 25, 2025

The ROI of Implementing a ZTNA solution

The ROI of Implementing a ZTNA solution

Estimated reading time: 3 minutes

In today’s digital landscape, where cyber threats are evolving rapidly, organizations must rethink their approach to network security. Traditional security models, such as VPNs and perimeter-based defenses, are no longer sufficient to protect against sophisticated cyberattacks. This is where...
Read Blog
February 24, 2025

Draft DPDPA Guidelines: What’s in it for Cybersecurity Leaders?

Draft DPDPA Guidelines: What’s in it for Cybersecurity Leaders?

Estimated reading time: 3 minutes

The Digital Personal Data Protection Act (DPDPA) is poised to redefine India’s cybersecurity and data protection landscape. The recent draft guidelines have sparked widespread discussions, especially among cybersecurity leaders responsible for safeguarding data and ensuring compliance. This blog explores...
Read Blog
January 10, 2025

5th January and The Tale of Joshi Virus: India’s First Global Computer Virus

5th January and The Tale of Joshi Virus: India’s First Global Computer Virus

Estimated reading time: 3 minutes

In the cinematic tapestry of cybersecurity, where tales of intrigue and innovation collide, one story emerges from the shadows of the past. It’s a story that began in the early 1990s, during the DOS era, when computer viruses were...
Read Blog
December 26, 2024

Seqrite XDR Awarded AV-TEST Approved Advanced EDR Certification. Here’s Why?

Seqrite XDR Awarded AV-TEST Approved Advanced EDR Certification. Here’s Why?

Estimated reading time: 4 minutes

Seqrite XDR Awarded AV-TEST Approved Advanced EDR Certification. Here’s Why? In today’s rapidly evolving cybersecurity landscape, enterprises face an onslaught of sophisticated threats that can evade traditional security measures. From stealthy malware to advanced persistent threats (APTs), the arsenal...
Read Blog
October 10, 2024

Preparing the Manufacturing Industry for New Age Cyber Attacks

Preparing the Manufacturing Industry for New Age Cyber Attacks

Estimated reading time: 3 minutes

‍In today’s interconnected world, the manufacturing industry is increasingly vulnerable to cyber-attacks. Recent incidents, such as the cyber attack on Suzuki motorcycles and the impact on billion-dollar companies like NVIDIA and Colonial Pipeline, highlight the devastating consequences of these...
Read Blog
March 29, 2024
← Previous 1 2 3 … 33 Next →
Featured Authors
  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director of Quick Heal Technologies...

    Read more..
  • Mahua Chakrabarthy
    Mahua Chakrabarthy

    A tea connoisseur who firmly believes that life is too short for dull content....

    Read more..
Topics
apt (21) BYOD (11) Cyber-attack (36) cyber-attacks (58) cyberattack (16) cyberattacks (13) Cybersecurity (326) cyber security (34) Cyber threat (33) cyber threats (48) data breach (55) data breaches (28) data loss (28) data loss prevention (34) data privacy (13) data protection (28) data security (15) DLP (49) Encryption (16) endpoint security (108) Enterprise security (17) Exploit (14) firewall (11) GDPR (12) hackers (11) malware (76) malware attack (23) malware attacks (12) MDM (26) Microsoft (15) Network security (22) Patch Management (12) phishing (27) Ransomware (67) ransomware attack (30) ransomware attacks (30) ransomware protection (14) security (12) Seqrite (35) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (17) windows (11)
Loading
Resources
  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies
About Us
  • About Seqrite
  • Leadership
  • Awards & Certifications
  • Newsroom
Archives
  • By Date
  • By Category
Loading

© 2025 Quick Heal Technologies Ltd. Cookie Policies Privacy Policies