Estimated reading time: 3 minutes
Businesses facing a barrage of security risks daily rely heavily on detection technologies to assess and work alongside the existing threat landscape. However, keeping up with the same can still be a daunting task with the existence of false...
Estimated reading time: 2 minutes
Defending the organizational perimeter from data breaches forms the crux of an existing security strategy. Neutralizing potential damages emanating out of cybersecurity threats is possible only if the data sets are secured across both sides of the perimeter. When...
Estimated reading time: 3 minutes
The airline business is unique. While public perception about aviation is that of a luxury business; the business world sees it as a financial behemoth reeling under debt burdens. Only people from the aviation industry and a few from the security industry understand that...
Estimated reading time: 4 minutes
A breach at IRINN systems could have affected India’s over 6000 ISPs, Government and Private Organisations. We at Seqrite’s Cyber Intelligence Labs (https://seqrite.com) working closely with our Partner, seQtree InfoServices (https://seqtree.com/) recently tracked a broadcast advertisement on a Darknet...
Estimated reading time: 3 minutes
Computer systems evolve at a breakneck pace. Every now and then, there are newer versions of software including web browsers, operating systems, and databases. These upgrades not only have better features but also have better security features built into them. However, many times...