• News
  • Security
  • Products
  • About Seqrite
Blogs on Information Technology, Network & Cybersecurity | Seqrite Blog
  • News
  • Security
  • Products
  • About Seqrite

Information Technology, Network Security & Cybersecurity Updates

SAP NetWeaver Metadata Uploader Vulnerability (CVE-2025-31324)

Estimated reading time: 3 minutes

Executive Summary CVE-2025-31324 is a critical remote code execution (RCE) vulnerability affecting the SAP NetWeaver Development Server, one of the core components used in enterprise environments for application development and integration. The vulnerability stems from improper validation of uploaded...
Read Blog
September 10, 2025

Critical Role of Mobile Device Management (MDM) in Organizations Today

Estimated reading time: 3 minutes

 In an increasingly mobile-first world, organizations are leveraging mobile devices for a variety of operational needs – making them indispensable tools for business productivity.  Whether it’s sales reps using tablets in the field, managers accessing dashboards from their phones,...
Read Blog
September 10, 2025

Operation BarrelFire: NoisyBear targets entities linked to Kazakhstan’s Oil & Gas Sector.

Estimated reading time: 10 minutes

Contents Introduction Key Targets Industries Affected. Geographical Focus. Infection Chain. Initial Findings Looking into the malicious email. Looking into the decoy-document. Technical Analysis Stage 0 – Malicious ZIP & LNK files. Stage 1 – Malicious BATCH scripts. Stage 2...
Read Blog
September 4, 2025

Google Salesforce Breach: A Deep dive into the chain and extent of the compromise

Google Salesforce Breach: A Deep dive into the chain and extent of the compromise

Estimated reading time: 10 minutes

Executive Summary In early June 2025, Google’s corporate Salesforce instance (used to store contact data for small‑ and medium‑sized business clients) was compromised through a sophisticated vishing‑extortion campaign orchestrated by the threat‑group tracked as UNC6040 & UNC6240 (online cybercrime collective known...
Read Blog
September 2, 2025

PromptLock: The First AI-Powered Ransomware & How It Works

PromptLock: The First AI-Powered Ransomware & How It Works

Estimated reading time: 4 minutes

Introduction AI-powered malware has become quite a trend now. We have always been discussing how threat actors could perform attacks by leveraging AI models, and here we have a PoC demonstrating exactly that. Although it has not yet been...
Read Blog
August 29, 2025

Operation HanKook Phantom: North Korean APT37 targeting South Korea

Operation HanKook Phantom: North Korean APT37 targeting South Korea

Estimated reading time: 13 minutes

Table of Contents: Introduction Threat Profile Infection Chain Campaign-1 Analysis of Decoy: Technical Analysis Fingerprint of ROKRAT’s Malware Campaign-2 Analysis of Decoy Technical analysis Detailed analysis of Decoded tony31.dat Conclusion Seqrite Protections MITRE Att&ck: IoCs Introduction: Seqrite Lab has...
Read Blog
August 29, 2025

WinRAR Directory Traversal & NTFS ADS Vulnerabilities (CVE-2025-6218 & CVE-2025-8088)

WinRAR Directory Traversal & NTFS ADS Vulnerabilities (CVE-2025-6218 & CVE-2025-8088)

Estimated reading time: 4 minutes

Executive Summary Two high-severity vulnerabilities in WinRAR for Windows — CVE-2025-6218 and CVE-2025-8088 — allow attackers to write files outside the intended extraction directory. CVE-2025-6218 involves traditional path traversal, while CVE-2025-8088 extends the attack using NTFS Alternate Data Streams...
Read Blog
August 25, 2025

Discover How To Close the Compliance Gap with Data Discovery

Discover How To Close the Compliance Gap with Data Discovery

Estimated reading time: 3 minutes

In today’s regulatory climate, compliance is no longer a box-ticking exercise. It is a strategic necessity. Organizations across industries are under pressure to secure sensitive data, meet privacy obligations, and avoid hefty penalties. Yet, despite all the talk about...
Read Blog
August 19, 2025

The Essential XDR Vendor Checklist: How to Choose the Right Partner for Your Cybersecurity Future

The Essential XDR Vendor Checklist: How to Choose the Right Partner for Your Cybersecurity Future

Estimated reading time: 3 minutes

Cyberattacks aren’t slowing down—they’re getting bolder and smarter. From phishing scams to ransomware outbreaks, the number of incidents has doubled or even tripled year over year. In today’s hybrid, multi-vendor IT landscape, protecting your organization’s digital assets requires choosing...
Read Blog
August 13, 2025

RBI Emphasizes Adopting Zero Trust Approaches for Banking Institutions

RBI Emphasizes Adopting Zero Trust Approaches for Banking Institutions

Estimated reading time: 3 minutes

In a significant move to bolster cybersecurity in India’s financial ecosystem, the Reserve Bank of India (RBI) has underscored the urgent need for regulated entities—especially banks—to adopt Zero Trust approaches as part of a broader strategy to curb cyber...
Read Blog
August 11, 2025
1 2 … 76 Next →
Featured Authors
  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director of Quick Heal Technologies...

    Read more..
  • Mahua Chakrabarthy
    Mahua Chakrabarthy

    A tea connoisseur who firmly believes that life is too short for dull content....

    Read more..
Topics
apt (23) BYOD (11) Cyber-attack (36) cyber-attacks (58) cyberattack (16) cyberattacks (15) Cybersecurity (330) cyber security (34) Cyber threat (33) cyber threats (49) data breach (56) data breaches (29) data loss (28) data loss prevention (33) data privacy (13) data protection (28) data security (15) DLP (49) Encryption (16) endpoint security (110) Enterprise security (18) Exploit (13) GDPR (13) hackers (11) malware (76) malware attack (23) malware attacks (12) MDM (27) Microsoft (15) mobile device management (11) Network security (23) Patch Management (12) phishing (29) Ransomware (68) ransomware attack (30) ransomware attacks (30) ransomware protection (14) security (11) Seqrite (35) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (16) windows (11)
Loading
Resources
  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies
About Us
  • About Seqrite
  • Leadership
  • Awards & Certifications
  • Newsroom
Archives
  • By Date
  • By Category
Loading

© 2025 Quick Heal Technologies Ltd. Cookie Policies Privacy Policies