• News
  • Security
  • Products
  • About Seqrite
Blogs on Information Technology, Network & Cybersecurity | Seqrite Blog
  • News
  • Security
  • Products
  • About Seqrite

Tag: Network security

From Alerts to Action: How an XDR Platform Transforms Your SOC Operations

From Alerts to Action: How an XDR Platform Transforms Your SOC Operations

Estimated reading time: 4 minutes

XDR solutions are revolutionizing how security teams handle threats by dramatically reducing false positives and streamlining operations. In fact, modern XDR platforms generate significantly fewer false positives than traditional SIEM threat analytics, allowing security teams to focus on genuine...
Read Blog
July 14, 2025

EDR vs XDR: Understanding the Differences and Choosing the Right Solution

EDR vs XDR: Understanding the Differences and Choosing the Right Solution

Estimated reading time: 4 minutes

In today’s rapidly evolving cyber landscape, organizations face an increasing number of sophisticated threats. Consequently, the need for robust cybersecurity measures has never been more critical. Two prominent solutions in this domain are Endpoint Detection and Response (EDR) and...
Read Blog
April 9, 2025

SnakeKeylogger: A Multistage Info Stealer Malware Campaign

SnakeKeylogger: A Multistage Info Stealer Malware Campaign

Estimated reading time: 6 minutes

Info-stealer malware has become a growing threat, with attackers constantly refining their techniques to evade detection. Among these threats, SnakeKeylogger has emerged as one of the highly active credential-stealing malware, targeting individuals and businesses. Known for its multi-stage infection...
Read Blog
March 25, 2025

Ransomware Attack Over Publicly Shared SMB2 Connections and Staying Protected with Seqrite

Ransomware Attack Over Publicly Shared SMB2 Connections and Staying Protected with Seqrite

Estimated reading time: 3 minutes

Ransomware continues to evolve as one of the most devastating cybersecurity threats, and attackers are finding new ways to exploit vulnerabilities. One such method involves targeting publicly shared SMB2 (Server Message Block version 2) connections. SMB, widely used for...
Read Blog
March 11, 2025

Demystifying PKT and Monero Cryptocurrency deployed on MSSQL servers

Demystifying PKT and Monero Cryptocurrency deployed on MSSQL servers

Estimated reading time: 8 minutes

The world is rapidly transitioning into the digital age, reshaping how we communicate, work, and conduct financial transactions. This shift is driven by advancements in technology, increased internet accessibility, and the integration of digital solutions into daily life. In...
Read Blog
February 20, 2025

What is SASE and how does it reinforce network security?

What is SASE and how does it reinforce network security?

Estimated reading time: 2 minutes

Secure Access Service Edge (SASE, commonly pronounced as “sassy”) is an emerging new cybersecurity concept that was coined by global research leaders Gartner in 2019. It refers to a new offering that simplifies Wide Area Networking (WAN) and enterprise...
Read Blog
May 13, 2020

Seqrite UTM : Security Weapon Against Man In The Middle Attacks

Seqrite UTM : Security Weapon Against Man In The Middle Attacks

Estimated reading time: 6 minutes

As implied in the name itself, Man In The Middle Attack is a type of attack where a illegal person tries to intercept the communication between two parties. Either to secretly overhear or to steal the critical data being...
Read Blog
December 3, 2019

How to build a zero trust network

How to build a zero trust network

Estimated reading time: 3 minutes

Traditionally, any discussion about network security is focused on a specific model that organizations have largely internalized. This model is boundary or parameter-based model and assumes of a perimeter or a boundary outside a network. By this model, cybersecurity...
Read Blog
September 6, 2018
114
Shares

5 Must Have Features of a Network Security Solution

5 Must Have Features of a Network Security Solution

Estimated reading time: 3 minutes

The changing dynamics of IT with its big data, mobile technologies, Bring Your Own Device (BYOD) and the Internet of Things have put an ever-increasing stress on the network as the threat landscape continues to broaden and advance at...
Read Blog
March 16, 2018
5
Shares

Hackers love organizations of all sizes

Hackers love organizations of all sizes

Estimated reading time: 3 minutes

Hacking is the unauthorized entry into a computer or network with the individuals engaged in these activities referred to as hackers. Hackers alter system or security software and/or hardware of the computer or network to accomplish a goal that...
Read Blog
March 15, 2018
14
Shares
1 2 3 Next →
Featured Authors
  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director of Quick Heal Technologies...

    Read more..
  • Mahua Chakrabarthy
    Mahua Chakrabarthy

    A tea connoisseur who firmly believes that life is too short for dull content....

    Read more..
Topics
apt (23) BYOD (11) Cyber-attack (36) cyber-attacks (58) cyberattack (16) cyberattacks (13) Cybersecurity (327) cyber security (34) Cyber threat (33) cyber threats (48) data breach (55) data breaches (28) data loss (28) data loss prevention (34) data privacy (13) data protection (28) data security (15) DLP (49) Encryption (16) endpoint security (109) Enterprise security (17) Exploit (14) firewall (11) GDPR (12) hackers (11) malware (76) malware attack (23) malware attacks (12) MDM (26) Microsoft (15) Network security (23) Patch Management (12) phishing (27) Ransomware (67) ransomware attack (30) ransomware attacks (30) ransomware protection (14) security (12) Seqrite (35) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (17) windows (11)
Loading
Resources
  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies
About Us
  • About Seqrite
  • Leadership
  • Awards & Certifications
  • Newsroom
Archives
  • By Date
  • By Category
Loading

© 2025 Quick Heal Technologies Ltd. Cookie Policies Privacy Policies