• News
  • Security
  • Products
  • About Seqrite
Blogs on Information Technology, Network & Cybersecurity | Seqrite Blog
  • News
  • Security
  • Products
  • About Seqrite

Tag: Seqrite

Beyond Passwords: Is Your System Truly Secure?

Beyond Passwords: Is Your System Truly Secure?

Estimated reading time: 3 minutes

The cybersecurity landscape is constantly evolving, with traditional methods of securing user accounts—such as passwords—proving increasingly inadequate against the growing sophistication of cyberattacks. In response, authentication systems that go Beyond Passwords, i.e., password-less, have emerged as a promising solution....
Read Blog
March 12, 2025

Ransomware Attack Over Publicly Shared SMB2 Connections and Staying Protected with Seqrite

Ransomware Attack Over Publicly Shared SMB2 Connections and Staying Protected with Seqrite

Estimated reading time: 3 minutes

Ransomware continues to evolve as one of the most devastating cybersecurity threats, and attackers are finding new ways to exploit vulnerabilities. One such method involves targeting publicly shared SMB2 (Server Message Block version 2) connections. SMB, widely used for...
Read Blog
March 11, 2025

How Attackers Exploit BitLocker: Turning Legitimate Tools into Ransomware Weapons

How Attackers Exploit BitLocker: Turning Legitimate Tools into Ransomware Weapons

Estimated reading time: 3 minutes

Introduction The ransomware landscape is evolving rapidly, with attackers constantly refining their techniques to outwit security defenses. One alarming trend is the weaponization of trusted tools like Microsoft’s BitLocker. Originally designed to safeguard sensitive data through encryption, BitLocker is...
Read Blog
March 11, 2025

Double Action, Triple Infection, and a New RAT: SideCopy’s Persistent Targeting of Indian Defence

Double Action, Triple Infection, and a New RAT: SideCopy’s Persistent Targeting of Indian Defence

Estimated reading time: 3 minutes

Overview A new attack campaign of SideCopy APT has been discovered targeting the Indian Defence sector. The group utilizes phishing email attachments & URLs as the infection vector to download malicious archive files leading to the deployment of two...
Read Blog
June 15, 2023

Update security certificate to install Seqrite product successfully

Update security certificate to install Seqrite product successfully

Estimated reading time: 2 minutes

  Issue Received the following installer setup file corruption error during installation of the Seqrite product Reason This error occurs due to missing security certificates in Windows OS. This error is encountered during installation of the Seqrite product. Solutions...
Read Blog
May 4, 2022

Seqrite EPS accredited with “Advanced Approved Endpoint Protection” for protection against complex ransomware attacks

Seqrite EPS accredited with “Advanced Approved Endpoint Protection” for protection against complex ransomware attacks

Estimated reading time: 2 minutes

Enterprises are no longer safe from dangerous and expensive ransomware attacks in modern times. It can enter an organization through multiple vectors, such as email spam, phishing attacks, or malicious web downloads. For the highest level of protection, organizations...
Read Blog
January 3, 2022

2020: A new paradigm in Cybersecurity

2020: A new paradigm in Cybersecurity

Estimated reading time: 3 minutes

As we enter a new decade, it is important to look back and learn from the decade that is about to end. From 2010 to 2019, cybersecurity moved at a furious pace. Threats erupted in multiple new vectors, spreading...
Read Blog
October 7, 2019

Are you taking your enterprise mobility management seriously?

Are you taking your enterprise mobility management seriously?

Estimated reading time: 2 minutes

A stark contrast to yesteryears with strict office hours, today’s business trends are permitting employees flexibility when it comes to office hours, remote working and devices through which they can work from. It is in this context, many leading...
Read Blog
August 20, 2019

Essential practices to strengthen your business’ cybersecurity

Essential practices to strengthen your business’ cybersecurity

Estimated reading time: 4 minutes

With enterprises being the centre of attention of an ever-evolving threat landscape, foolproof security of business assets has become the need of the hour. To counter the menace of cyberattacks, today we have businesses that specialize in the development...
Read Blog
August 16, 2019

How should enterprises fill the rising talent gap in cybersecurity?

How should enterprises fill the rising talent gap in cybersecurity?

Estimated reading time: 2 minutes

The cyber threat landscape is one of the most talked-about issues, across industries, currently. The dynamic nature of cyberattacks automatically transforms cybersecurity to be the complete opposite of a stable function. Cybercriminals and hackers are trying to find new...
Read Blog
August 8, 2019
← Previous 1 2 3 4 Next →
Featured Authors
  • Seqrite
    Seqrite

    Seqrite is a leading enterprise cybersecurity solutions provider. With a focus...

    Read more..
  • Jyoti Karlekar
    Jyoti Karlekar

    I'm an avid writer who enjoys crafting content about emerging technologies and...

    Read more..
  • Bineesh P
    Bineesh P

    I am a passionate cybersecurity enthusiast and a dedicated writer. With a knack...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director of Quick Heal Technologies...

    Read more..
Topics
apt (25) Cyber-attack (36) cyber-attacks (58) cyberattack (16) cyberattacks (15) Cybersecurity (334) cyber security (34) Cyber threat (33) cyber threats (50) data breach (56) data breaches (29) data loss (28) data loss prevention (33) data privacy (14) data protection (30) data security (15) DLP (49) DPDP (13) DPDPA (12) Encryption (16) endpoint security (110) Enterprise security (18) Exploit (13) GDPR (13) malware (76) malware analysis (13) malware attack (23) malware attacks (12) MDM (27) Microsoft (15) Network security (24) Patch Management (12) phishing (29) Ransomware (69) ransomware attack (30) ransomware attacks (30) ransomware protection (14) Seqrite (39) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) Threat Intelligence (13) UTM (34) Vulnerability (16) zero trust (13)
Loading
Resources
  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies
About Us
  • About Seqrite
  • Leadership
  • Awards & Certifications
  • Newsroom
Archives
  • By Date
  • By Category
Loading

© 2025 Quick Heal Technologies Ltd. Cookie Policies Privacy Policies