• News
  • Security
  • Products
  • About Seqrite
Blogs on Information Technology, Network & Cybersecurity | Seqrite Blog
  • News
  • Security
  • Products
  • About Seqrite

Information Technology, Network Security & Cybersecurity Updates

Algorithmic Models & DPDPA: What Data Fiduciaries Must Know

Algorithmic Models & DPDPA: What Data Fiduciaries Must Know

Estimated reading time: 2 minutes

Algorithms and statistical models are no longer just technical tools, they are decision-making engines. From personalizing offers to predicting credit risk or churn, businesses increasingly rely on automated systems that process personal data at scale. But with this power...
Read Blog
December 22, 2025

UNG0801: Tracking Threat Clusters obsessed with AV Icon Spoofing targeting Israel

UNG0801: Tracking Threat Clusters obsessed with AV Icon Spoofing targeting Israel

Estimated reading time: 12 minutes

Key Targets. Industries Affected. Geographical Focus. Infection Chain – Operation IconCat. Infection Chain – I. Infection Chain – II. Campaign-Analysis – Operation IconCat. Campaign-I Initial Findings. Looking into the malicious PDF File. Technical Analysis. Malicious PyInstaller implant – PYTRIC...
Read Blog
December 22, 2025

Indian Income Tax-Themed Phishing Campaign Targets Local Businesses

Indian Income Tax-Themed Phishing Campaign Targets Local Businesses

Estimated reading time: 9 minutes

Introduction Over the past few months, tax-themed phishing and malware campaigns have surged, particularly during and after the Income Tax Return (ITR) filing season. With ongoing public discussions around refund timelines, these scams appear more credible, giving attackers the...
Read Blog
December 22, 2025

Operation MoneyMount-ISO — Deploying Phantom Stealer via ISO-Mounted Executables

Operation MoneyMount-ISO — Deploying Phantom Stealer via ISO-Mounted Executables

Estimated reading time: 8 minutes

Table of Contents: Introduction: Targeted sectors: Initial Findings about Campaign: Analysis of Phishing Mail: Infection Chain: Technical Analysis: Stage-1: Analysis of Malicious ISO file. Stage-2: Analysis of Executable. Analysis of 1st Payload Analysis of 2nd Payload (Phantom Stealer) Conclusion:...
Read Blog
December 12, 2025

Deceptive Layoff-Themed HR Email Distributes Remcos RAT Malware

Estimated reading time: 4 minutes

Over the past few months, job economy has been marked by uncertainty, with constant news about layoffs, restructuring, hiring freezes, and aggressive cost-cutting measures. This atmosphere has created widespread anxiety among both employees and organizations, and cybercriminals have quickly...
Read Blog
December 9, 2025

Operation FrostBeacon: Multi-Cluster Cobalt Strike Campaign Targets Russia

Estimated reading time: 11 minutes

Operation FrostBeacon: Multi-Cluster Cobalt Strike Campaign Targets Russia Contents Introduction Key Targets Geographical Focus Industries Affected LNK Cluster Initial Access: Archive Delivery Phishing Email and Decoys Malicious LNK and HTA Loader Obfuscated PowerShell Payload CVE Cluster Phishing Emails Chaining...
Read Blog
December 8, 2025

The ₹250 Crore Question: How India’s DPDPA Rewrites the Cost of a Data Breach

The ₹250 Crore Question: How India’s DPDPA Rewrites the Cost of a Data Breach

Estimated reading time: 6 minutes

In the rapidly digitizing landscape of India, data is the new oil – but it is also a ticking time bomb. For years, organizations across the subcontinent have faced an escalating onslaught of cyberattacks, resulting in a steady stream...
Read Blog
December 8, 2025

Operation DupeHike : UNG0902 targets Russian employees with DUPERUNNER and AdaptixC2

Estimated reading time: 11 minutes

Contents Introduction Key Targets. Industries Affected. Geographical Focus. Infection Chain. Initial Findings. Looking into the decoy-document Technical Analysis Stage 1 – Malicious LNK Script Stage 2 – DUPERUNNER Implant Stage 3 – AdaptixC2 Beacon. Infrastructural Artefacts. Conclusion SEQRITE Protection....
Read Blog
December 3, 2025

DPDP Act Redefines Banking Rules: What India’s Banks Need to Know

DPDP Act Redefines Banking Rules: What India’s Banks Need to Know

Estimated reading time: 4 minutes

Fortifying India’s Banking Backbone: How the DPDP Act Redefines the Rules of the Game India’s banks aren’t just financial institutions; they’re the backbone of the economy. Every month, UPI alone processes a jaw-dropping ₹251 lakh crore in transactions (source)....
Read Blog
December 3, 2025

Operation Hanoi Thief: Threat Actor targets Vietnamese IT professionals and recruitment teams.

Estimated reading time: 10 minutes

Operation Hanoi Thief: Threat Actor targets Vietnamese IT professionals and recruitment teams. Introduction Key Targets. Industries Affected. Geographical Focus. Infection Chain. Initial Findings Looking into the decoy-document Technical Analysis Stage 1 – Malicious LNK Script Stage 2 – Pseudo-Polyglot...
Read Blog
November 28, 2025
1 2 … 79 Next →
Featured Authors
  • Seqrite
    Seqrite

    Seqrite is a leading enterprise cybersecurity solutions provider. With a focus...

    Read more..
  • Jyoti Karlekar
    Jyoti Karlekar

    I'm an avid writer who enjoys crafting content about emerging technologies and...

    Read more..
  • Bineesh P
    Bineesh P

    I am a passionate cybersecurity enthusiast and a dedicated writer. With a knack...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director of Quick Heal Technologies...

    Read more..
Topics
apt (25) Cyber-attack (36) cyber-attacks (58) cyberattack (16) cyberattacks (15) Cybersecurity (334) cyber security (34) Cyber threat (33) cyber threats (50) data breach (56) data breaches (29) data loss (28) data loss prevention (33) data privacy (14) data protection (30) data security (15) DLP (49) DPDP (13) DPDPA (14) Encryption (16) endpoint security (110) Enterprise security (18) Exploit (13) GDPR (13) malware (76) malware analysis (13) malware attack (23) malware attacks (12) MDM (27) Microsoft (15) Network security (24) Patch Management (12) phishing (29) Ransomware (69) ransomware attack (30) ransomware attacks (30) ransomware protection (14) Seqrite (40) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) Threat Intelligence (13) UTM (34) Vulnerability (16) zero trust (13)
Loading
Resources
  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies
About Us
  • About Seqrite
  • Leadership
  • Awards & Certifications
  • Newsroom
Archives
  • By Date
  • By Category
Loading

© 2025 Quick Heal Technologies Ltd. Cookie Policies Privacy Policies