• News
  • Security
  • Products
  • About Seqrite
Blogs on Information Technology, Network & Cybersecurity | Seqrite Blog
  • News
  • Security
  • Products
  • About Seqrite

Tag: Cybersecurity

Seqrite Endpoint Security Supports Windows 10 Feature Update Version 21H2

Seqrite Endpoint Security Supports Windows 10 Feature Update Version 21H2

Estimated reading time: < 1 minute

Microsoft has recently developed a new feature update for Windows 10 PCs, Windows 10, version 21H2 (Windows 10 21H2). This article highlights some of the new features of Windows 10 21H2 and how Seqrite Endpoint Security (EPS) is compatible...
Read Blog
November 17, 2021

Multi-Staged JSOutProx RAT Targets Indian Co-Operative Banks and Finance Companies

Multi-Staged JSOutProx RAT Targets Indian Co-Operative Banks and Finance Companies

Estimated reading time: 6 minutes

  Quick Heal Security Labs has been monitoring various attack campaigns using JSOutProx RAT against different SMBs in the BFSI sector since January 2021. We have found multiple payloads being dropped at different stages of its operations. Although the...
Read Blog
October 22, 2021

Seqrite Endpoint Security Cloud Supports Windows 11

Seqrite Endpoint Security Cloud Supports Windows 11

Estimated reading time: < 1 minute

Microsoft has released an all-new Windows 11 Operating System (OS). This article highlights some of the new features of Windows 11 and how Seqrite Endpoint Security Cloud is compatible with Windows 11. Few highlights of Windows 11 Windows 11...
Read Blog
October 8, 2021

Seqrite Endpoint Security Supports the Latest Windows 11 Release

Seqrite Endpoint Security Supports the Latest Windows 11 Release

Estimated reading time: < 1 minute

Microsoft has released an all-new Windows 11 Operating System (OS). This article highlights some of the new features of Windows 11 and how Seqrite Endpoint Security (EPS) is compatible with Windows 11. Few highlights of Windows 11 Windows 11...
Read Blog
October 5, 2021

Moving to the cloud? Learn how to manage your cyber risks on the journey to cloud transformation

Moving to the cloud? Learn how to manage your cyber risks on the journey to cloud transformation

Estimated reading time: 4 minutes

Cloud adoption has witnessed exponential growth over the past few years. However, it brings forth a new set of cyber risks that endanger organizations and their customers. In the best-case scenario, these unknown cyber risks may result in increased...
Read Blog
August 12, 2021

Seqrite uncovers second wave of Operation SideCopy targeting Indian critical infrastructure PSUs

Seqrite uncovers second wave of Operation SideCopy targeting Indian critical infrastructure PSUs

Estimated reading time: 3 minutes

The SideCopy APT Group has expanded its activity this year and now targets critical Indian sectors this time. Quick Heal Security Labs researchers have been tracking the notorious cyber-attack group – ‘Transparent Tribe’ since the first SideCopy campaign in...
Read Blog
July 9, 2021

Secure Your Digital Transformation Journey With Seqrite’s Centralized Hawkkeye Platform

Secure Your Digital Transformation Journey With Seqrite’s Centralized Hawkkeye Platform

Estimated reading time: 3 minutes

The last decade has witnessed an accelerated adoption of cloud, mobile, and cloud apps. Over the previous year, with the new normal kicking in, organizations had to transition their employees to work outside the enterprise perimeter. As remote work...
Read Blog
June 29, 2021

Introducing Seqrite HawkkEye – A Centralized Security Solution For The Digital Age

Introducing Seqrite HawkkEye – A Centralized Security Solution For The Digital Age

Estimated reading time: 2 minutes

The evolution of the Work From Anywhere model has led to a highly distributed workforce with a proliferation of devices that are both BYOD and corporate-owned. This proliferation has resulted in an expansion of an enterprise’s attack surface, due...
Read Blog
June 25, 2021

Seqrite announces SHA-1 deprecation for its products

Seqrite announces SHA-1 deprecation for its products

Estimated reading time: 2 minutes

SHA-1 and SHA-2 are the digest algorithms of the code signing certificate used by Seqrite to sign the code of its products.  According to an announcement, Microsoft will no longer allow certificate providers to issue SHA-1 supported certificates. Seqrite has...
Read Blog
May 27, 2021

Everything you need to know about the Microsoft Exchange Server Zero-Day Vulnerabilities

Everything you need to know about the Microsoft Exchange Server Zero-Day Vulnerabilities

Estimated reading time: 5 minutes

On March 2, Microsoft announced a threat group, HAFNIUM, is actively exploiting four zero-day vulnerabilities in their Exchange Servers.  Microsoft has released out-of-band security updates (CVE-2021-26855, CVE-2021-26857, CVE-2021-26858, and CVE-2021-27065), enabling attackers to take access email accounts and run...
Read Blog
May 18, 2021
← Previous 1 … 4 5 6 … 34 Next →
Featured Authors
  • Seqrite
    Seqrite

    Seqrite is a leading enterprise cybersecurity solutions provider. With a focus...

    Read more..
  • Jyoti Karlekar
    Jyoti Karlekar

    I'm an avid writer who enjoys crafting content about emerging technologies and...

    Read more..
  • Bineesh P
    Bineesh P

    I am a passionate cybersecurity enthusiast and a dedicated writer. With a knack...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director of Quick Heal Technologies...

    Read more..
Topics
apt (25) Cyber-attack (36) cyber-attacks (58) cyberattack (16) cyberattacks (15) Cybersecurity (335) cyber security (34) Cyber threat (33) cyber threats (50) data breach (56) data breaches (29) data loss (28) data loss prevention (33) data privacy (15) data protection (30) data security (15) DLP (49) DPDP (13) DPDPA (15) Encryption (16) endpoint security (110) Enterprise security (18) Exploit (13) GDPR (13) malware (76) malware analysis (13) malware attack (23) malware attacks (12) MDM (27) Microsoft (15) Network security (24) Patch Management (12) phishing (29) Ransomware (69) ransomware attack (30) ransomware attacks (30) ransomware protection (14) Seqrite (40) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) Threat Intelligence (13) UTM (34) Vulnerability (16) zero trust (13)
Loading
Blogs on Information Technology, Network & Cybersecurity | Seqrite

Leading enterprise IT security solutions provider simplifying endpoint, data, and network security with best-in-class threat prevention, detection, and response solutions worldwide.

Read More

Follow us:

Subscribe To Our Newsletter

Stay informed about the latest cybersecurity trends and insights.

Loading
Products & Services
  • Cloud
  • Endpoint Protection
  • Endpoint Detection and Response
  • Mobile Device Management
  • BYOD
  • Extended Detection and Response
  • Zero Trust Network Access
  • Data Privacy
  • On Prem
  • Endpoint Protection
  • Endpoint Detection and Response
  • Data Privacy
  • Platform
  • Malware Analysis Platform
  • Micro Business
  • SOHO Total Edition
  • Services
  • Threat Intel
  • Digital Risk Protection Services (DRPS)
  • Ransomware Recovery as a Services (RRaaS)
  • DPDP Compliance
  • Managed Detection and Response
Resources
  • Blogs
  • Whitepapers
  • Datasheets
  • Threat Reports
  • Manuals
  • Policy & Compliance
  • EULA
  • PoV
  • GoDeep.AI
Contact Us
  • Registered Offices
  • Nearest Offices
  • Let’s Talk Cybersecurity
Support
  • Technical Support
  • Download Software
  • Offline Updater
  • Firmware Upgrades
  • Upgrades
  • Product Documentation
About Us
  • About Seqrite
  • Leadership
  • Awards & Recognition
  • Newsroom
Partner
  • Partner Program
  • Locate Partner
  • Become A Partner
  • Seqrite Certification

© 2026 Quick Heal Technologies Ltd. Cookie Policies Privacy Policies