• News
  • Security
  • Products
  • About Seqrite
Blogs on Information Technology, Network & Cybersecurity | Seqrite Blog
  • News
  • Security
  • Products
  • About Seqrite

Tag: malware

Unseen Threats Lurking: Protect Your Small Business from Cyberattacks with the Right Defence Strategy

Unseen Threats Lurking: Protect Your Small Business from Cyberattacks with the Right Defence Strategy

Estimated reading time: 5 minutes

The pandemic has expedited digital transformation, making technology and data pivotal to most businesses. However, it has also increased cyber threats, especially for small and medium-sized enterprises (SMBs). In addition, data regulations have also become more stringent, with fines...
Read Blog
April 25, 2023

Healthcare on High Alert: The Alarming Rise of Cyberattacks on eInfra Sends Shockwaves Through the Industry – Are You Safe?

Healthcare on High Alert: The Alarming Rise of Cyberattacks on eInfra Sends Shockwaves Through the Industry – Are You Safe?

Estimated reading time: 3 minutes

The world of healthcare is rapidly changing. Technological advancements expose organizations to cyber risks, including ransomware, malware, breaches, viruses, and vulnerabilities. The combination of poor cybersecurity practices, digital transformation in care delivery, operational touchpoints, and sensitive data storage makes...
Read Blog
April 11, 2023

Seqrite EPS accredited with “Advanced Approved Endpoint Protection” for protection against complex ransomware attacks

Seqrite EPS accredited with “Advanced Approved Endpoint Protection” for protection against complex ransomware attacks

Estimated reading time: 2 minutes

Enterprises are no longer safe from dangerous and expensive ransomware attacks in modern times. It can enter an organization through multiple vectors, such as email spam, phishing attacks, or malicious web downloads. For the highest level of protection, organizations...
Read Blog
January 3, 2022

Top 6 cybersecurity threats that every Startup or Business should have to be ready to fight in current times

Top 6 cybersecurity threats that every Startup or Business should have to be ready to fight in current times

Estimated reading time: 4 minutes

If you’ve been following the news recently, you’ll undoubtedly have read about cybersecurity incidents impacting corporations of all sizes in all industries around the world. While it doesn’t often make the news, even small- and medium-sized businesses (SMBs) have...
Read Blog
December 3, 2021

Anydesk Software Exploited to Spread Babuk Ransomware

Anydesk Software Exploited to Spread Babuk Ransomware

Estimated reading time: 7 minutes

We generally see that ransomware attacks are deployed through exploits, unsolicited malicious emails (malspam), or malicious Microsoft Office documents. Attackers trick the unsuspecting users into enabling macros, etc. Apart from these usual attack techniques, we came across a new...
Read Blog
November 24, 2021

CetaRAT APT Group – Targeting The Government Agencies

CetaRAT APT Group – Targeting The Government Agencies

Estimated reading time: 4 minutes

CetaRAT was seen for the first time in the Operation SideCopy APT. Now it is continuously expanding its activity since then. We have been tracking this RAT for a long time and observed an increase in targeting the Indian...
Read Blog
October 19, 2021

Introducing Seqrite HawkkEye – A Centralized Security Solution For The Digital Age

Introducing Seqrite HawkkEye – A Centralized Security Solution For The Digital Age

Estimated reading time: 2 minutes

The evolution of the Work From Anywhere model has led to a highly distributed workforce with a proliferation of devices that are both BYOD and corporate-owned. This proliferation has resulted in an expansion of an enterprise’s attack surface, due...
Read Blog
June 25, 2021

How to avoid dual attack and vulnerable files with double extension?

How to avoid dual attack and vulnerable files with double extension?

Estimated reading time: 2 minutes

The dual extension or double extension is one of the oldest forms of cyber-attacks but continues to be extremely effective. The reason for the continued effectiveness of this type of attack lies in its simplicity. File extensions are so...
Read Blog
April 9, 2021

Anyone, even you, can carry out cyberattacks with the Malware-as-a-Service model

Anyone, even you, can carry out cyberattacks with the Malware-as-a-Service model

Estimated reading time: 2 minutes

In an age where solutions like cloud, mobility, storage and security are offered as part of service models, it is to no surprise that malware also has its service offering, aptly called Malware-as-a-Service (MaaS)? Of course, there’s a misnomer...
Read Blog
October 30, 2020

The return of the Emotet as the world unlocks!

The return of the Emotet as the world unlocks!

Estimated reading time: 5 minutes

A threat actor named Emotet Trojan has been in the wild for more than 5 years, and now it is back after a 5 months break. It has spread globally, infecting new as well as old targets. It is...
Read Blog
September 29, 2020
← Previous 1 2 3 … 8 Next →
Featured Authors
  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director of Quick Heal Technologies...

    Read more..
  • Mahua Chakrabarthy
    Mahua Chakrabarthy

    A tea connoisseur who firmly believes that life is too short for dull content....

    Read more..
Topics
apt (19) Cyber-attack (35) cyber-attacks (58) cyberattack (16) cyberattacks (13) Cybersecurity (322) cyber security (31) Cyber threat (33) cyber threats (48) Data (11) data breach (55) data breaches (28) data loss (28) data loss prevention (34) data privacy (11) data protection (24) data security (15) DLP (49) Encryption (16) endpoint security (107) Enterprise security (17) Exploit (14) firewall (11) GDPR (12) hackers (11) malware (76) malware attack (23) malware attacks (12) MDM (25) Microsoft (15) Network security (22) Patch Management (12) phishing (27) Ransomware (67) ransomware attack (30) ransomware attacks (30) ransomware protection (13) security (11) Seqrite (33) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (16) windows (11)
Loading
Resources
  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies
About Us
  • About Seqrite
  • Leadership
  • Awards & Certifications
  • Newsroom
Archives
  • By Date
  • By Category
Loading

© 2025 Quick Heal Technologies Ltd. Cookie Policies Privacy Policies