• News
  • Security
  • Products
  • About Seqrite
Blogs on Information Technology, Network & Cybersecurity | Seqrite Blog
  • News
  • Security
  • Products
  • About Seqrite

Tag: Cybersecurity

Seqrite Endpoint Security Supports the Latest Windows 11 Release

Seqrite Endpoint Security Supports the Latest Windows 11 Release

Estimated reading time: < 1 minute

Microsoft has released an all-new Windows 11 Operating System (OS). This article highlights some of the new features of Windows 11 and how Seqrite Endpoint Security (EPS) is compatible with Windows 11. Few highlights of Windows 11 Windows 11...
Read Blog
October 5, 2021

Moving to the cloud? Learn how to manage your cyber risks on the journey to cloud transformation

Moving to the cloud? Learn how to manage your cyber risks on the journey to cloud transformation

Estimated reading time: 4 minutes

Cloud adoption has witnessed exponential growth over the past few years. However, it brings forth a new set of cyber risks that endanger organizations and their customers. In the best-case scenario, these unknown cyber risks may result in increased...
Read Blog
August 12, 2021

Seqrite uncovers second wave of Operation SideCopy targeting Indian critical infrastructure PSUs

Seqrite uncovers second wave of Operation SideCopy targeting Indian critical infrastructure PSUs

Estimated reading time: 3 minutes

The SideCopy APT Group has expanded its activity this year and now targets critical Indian sectors this time. Quick Heal Security Labs researchers have been tracking the notorious cyber-attack group – ‘Transparent Tribe’ since the first SideCopy campaign in...
Read Blog
July 9, 2021

Secure Your Digital Transformation Journey With Seqrite’s Centralized Hawkkeye Platform

Secure Your Digital Transformation Journey With Seqrite’s Centralized Hawkkeye Platform

Estimated reading time: 3 minutes

The last decade has witnessed an accelerated adoption of cloud, mobile, and cloud apps. Over the previous year, with the new normal kicking in, organizations had to transition their employees to work outside the enterprise perimeter. As remote work...
Read Blog
June 29, 2021

Introducing Seqrite HawkkEye – A Centralized Security Solution For The Digital Age

Introducing Seqrite HawkkEye – A Centralized Security Solution For The Digital Age

Estimated reading time: 2 minutes

The evolution of the Work From Anywhere model has led to a highly distributed workforce with a proliferation of devices that are both BYOD and corporate-owned. This proliferation has resulted in an expansion of an enterprise’s attack surface, due...
Read Blog
June 25, 2021

Seqrite announces SHA-1 deprecation for its products

Seqrite announces SHA-1 deprecation for its products

Estimated reading time: 2 minutes

SHA-1 and SHA-2 are the digest algorithms of the code signing certificate used by Seqrite to sign the code of its products.  According to an announcement, Microsoft will no longer allow certificate providers to issue SHA-1 supported certificates. Seqrite has...
Read Blog
May 27, 2021

Everything you need to know about the Microsoft Exchange Server Zero-Day Vulnerabilities

Everything you need to know about the Microsoft Exchange Server Zero-Day Vulnerabilities

Estimated reading time: 5 minutes

On March 2, Microsoft announced a threat group, HAFNIUM, is actively exploiting four zero-day vulnerabilities in their Exchange Servers.  Microsoft has released out-of-band security updates (CVE-2021-26855, CVE-2021-26857, CVE-2021-26858, and CVE-2021-27065), enabling attackers to take access email accounts and run...
Read Blog
May 18, 2021

Why ensuring employees with cyber hygiene is important for all organizations?

Why ensuring employees with cyber hygiene is important for all organizations?

Estimated reading time: 2 minutes

Current times have witnessed a large percentage of cyber breaches resulting from human errors. For example, the famous WannaCry ransomware attack that affected the entire world in 2017 increased due to negligence of security teams in ensuring  if the...
Read Blog
May 12, 2021

How to avoid dual attack and vulnerable files with double extension?

How to avoid dual attack and vulnerable files with double extension?

Estimated reading time: 2 minutes

The dual extension or double extension is one of the oldest forms of cyber-attacks but continues to be extremely effective. The reason for the continued effectiveness of this type of attack lies in its simplicity. File extensions are so...
Read Blog
April 9, 2021

Cryptocurrency Malware: Bitcoin Mining threats you need to know about

Cryptocurrency Malware: Bitcoin Mining threats you need to know about

Estimated reading time: 2 minutes

The entire world’s eyes are on Bitcoin right now since the cryptocurrency’s valuation touched an all-time high. The world’s oldest cryptocurrency is currently being valued at close to USD 40,000, a valuation that is almost a quadruple rise in just a...
Read Blog
April 4, 2021
← Previous 1 … 3 4 5 … 33 Next →
Featured Authors
  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director of Quick Heal Technologies...

    Read more..
  • Mahua Chakrabarthy
    Mahua Chakrabarthy

    A tea connoisseur who firmly believes that life is too short for dull content....

    Read more..
Topics
apt (19) Cyber-attack (35) cyber-attacks (58) cyberattack (16) cyberattacks (13) Cybersecurity (322) cyber security (31) Cyber threat (33) cyber threats (48) Data (11) data breach (55) data breaches (28) data loss (28) data loss prevention (34) data privacy (11) data protection (24) data security (15) DLP (49) Encryption (16) endpoint security (107) Enterprise security (17) Exploit (14) firewall (11) GDPR (12) hackers (11) malware (76) malware attack (23) malware attacks (12) MDM (25) Microsoft (15) Network security (22) Patch Management (12) phishing (27) Ransomware (67) ransomware attack (30) ransomware attacks (30) ransomware protection (13) security (11) Seqrite (33) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (16) windows (11)
Loading
Resources
  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies
About Us
  • About Seqrite
  • Leadership
  • Awards & Certifications
  • Newsroom
Archives
  • By Date
  • By Category
Loading

© 2025 Quick Heal Technologies Ltd. Cookie Policies Privacy Policies