• News
  • Security
  • Products
  • About Seqrite
Blogs on Information Technology, Network & Cybersecurity | Seqrite Blog
  • News
  • Security
  • Products
  • About Seqrite

Information Technology, Network Security & Cybersecurity Updates

Masslogger Fileless Variant – Spreads via .VBE, Hides in Registry

Masslogger Fileless Variant – Spreads via .VBE, Hides in Registry

Estimated reading time: 10 minutes

Masslogger Fileless Variant – Spreads via .VBE, Hides in Registry  During our recent investigation at Seqrite Labs, we identified a sophisticated variant of Masslogger credential stealer malware spreading through .VBE (VBScript Encoded) files. Initially, the variant appeared to be...
Read Blog
June 18, 2025

Lured and Compromised: Unmasking the Digital Danger of Honey Traps

Lured and Compromised: Unmasking the Digital Danger of Honey Traps

Estimated reading time: 5 minutes

Behind the screen, a delicate balance of trust and deception plays out. Honey traps, once the preserve of espionage, have now insidiously spread into the digital realm, capitalizing on human emotions. What starts as a harmless-looking chat or friend...
Read Blog
June 17, 2025

ZTNA vs VPN: Why Zero Trust Is the Future of Secure Access

ZTNA vs VPN: Why Zero Trust Is the Future of Secure Access

Estimated reading time: 3 minutes

ZTNA vs VPN is a critical comparison in today’s hyperconnected world, where remote workforces, cloud-driven data flows, and ever-evolving threats make securing enterprise network access more complex than ever. Traditional tools like Virtual Private Networks (VPNs), which once stood...
Read Blog
June 16, 2025

5 Signs Your Organization Needs Zero Trust Network Access

5 Signs Your Organization Needs Zero Trust Network Access

Estimated reading time: 3 minutes

In today’s hyperconnected business environment, the question isn’t if your organization will face a security breach, but when. With the growing complexity of remote workforces, cloud adoption, and third-party integrations, many businesses are discovering that their traditional security tools...
Read Blog
June 10, 2025

Security Flaws in eMagicOne Store Manager for WooCommerce in WordPress (CVE-2025-5058 and CVE-2025-4603)

Security Flaws in eMagicOne Store Manager for WooCommerce in WordPress (CVE-2025-5058 and CVE-2025-4603)

Estimated reading time: 3 minutes

Security Flaws in eMagicOne Store Manager for WooCommerce in WordPress (CVE-2025-5058 and CVE-2025-4603)  The eMagicOne Store Manager for WooCommerce plugin is in WordPress used to simplify and improve store management by providing functionality not found in the normal WooCommerce...
Read Blog
June 10, 2025

How Seqrite Endpoint Protection Blocks Non-Human Threats like Bots, Scripts, and Malware

How Seqrite Endpoint Protection Blocks Non-Human Threats like Bots, Scripts, and Malware

Estimated reading time: 4 minutes

How Seqrite Endpoint Protection Blocks Non-Human Threats like Bots, Scripts, and Malware In today’s hyper-connected digital world, the cybersecurity landscape is shifting dramatically. Gone are the days when cyberattacks primarily relied on human intervention. We’re now facing a new...
Read Blog
June 9, 2025

Operation DRAGONCLONE: Chinese Telecommunication industry targeted via VELETRIX & VShell malware

Operation DRAGONCLONE: Chinese Telecommunication industry targeted via VELETRIX & VShell malware

Estimated reading time: 10 minutes

Operation DRAGONCLONE: Chinese Telecommunication industry targeted via VELETRIX & VShell malware. Contents Introduction Initial Findings Infection Chain. Technical Analysis Stage 0 – Malicious ZIP File. Stage 1 – Malicious VELETRIX implant. Stage 2 – Malicious V-Shell implant. Hunting and...
Read Blog
June 6, 2025

Rethinking Design: Why Privacy Shouldn’t Be an Afterthought

Rethinking Design: Why Privacy Shouldn’t Be an Afterthought

Estimated reading time: 3 minutes

As organizations continue to embrace digital transformation, how we think about personal data has changed fundamentally. Data is no longer just a by-product of business processes; it is often the product itself. This shift brings a pressing responsibility: privacy...
Read Blog
June 6, 2025

Trapped by a Call: The Digital Arrest Scam

Trapped by a Call: The Digital Arrest Scam

Estimated reading time: 5 minutes

Digital Arrest Scam: It all starts with a phone call that seems routine at first—measured, official-sounding, and unexpectedly serious. On the other end is someone claiming to represent a government body, calmly accusing you of crimes you’ve never committed—drug...
Read Blog
June 5, 2025

5 Benefits of Generative AI in Extended Detection and Response (XDR)

5 Benefits of Generative AI in Extended Detection and Response (XDR)

Estimated reading time: 2 minutes

5 Benefits of Generative AI in Extended Detection and Response (XDR) Generative Artificial Intelligence (GenAI) is transforming cybersecurity by enhancing Extended Detection and Response (XDR) systems, which integrate data from multiple security layers to provide comprehensive threat detection and...
Read Blog
May 26, 2025
1 2 … 74 Next →
Featured Authors
  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director of Quick Heal Technologies...

    Read more..
  • Mahua Chakrabarthy
    Mahua Chakrabarthy

    A tea connoisseur who firmly believes that life is too short for dull content....

    Read more..
Topics
apt (21) Cyber-attack (36) cyber-attacks (58) cyberattack (16) cyberattacks (13) Cybersecurity (324) cyber security (34) Cyber threat (33) cyber threats (48) Data (11) data breach (55) data breaches (28) data loss (28) data loss prevention (34) data privacy (12) data protection (25) data security (15) DLP (49) Encryption (16) endpoint security (108) Enterprise security (17) Exploit (14) firewall (11) GDPR (12) hackers (11) malware (76) malware attack (23) malware attacks (12) MDM (25) Microsoft (15) Network security (22) Patch Management (12) phishing (27) Ransomware (67) ransomware attack (30) ransomware attacks (30) ransomware protection (14) security (11) Seqrite (33) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (17) windows (11)
Loading
Resources
  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies
About Us
  • About Seqrite
  • Leadership
  • Awards & Certifications
  • Newsroom
Archives
  • By Date
  • By Category
Loading

© 2025 Quick Heal Technologies Ltd. Cookie Policies Privacy Policies