• News
  • Security
  • Products
  • About Seqrite
Blogs on Information Technology, Network & Cybersecurity | Seqrite Blog
  • News
  • Security
  • Products
  • About Seqrite
Home  /  Uncategorized  /  Your Data and Devices are safe with SEQRITE
Your Data and Devices are safe with SEQRITE
19 November 2022

Your Data and Devices are safe with SEQRITE

Written by Seqrite
Seqrite
Uncategorized
Estimated reading time: 2 minutes

On 19th November at 8:17 am, we became aware of a false positive detection on excel files and the same getting quarantined on some customer devices.

We sincerely regret the inconvenience caused. We immediately took necessary actions investigating the matter, thereby initiating a root cause analysis.

We would like to share that this issue was promptly resolved by 2:26 pm. The update package with the fix was made available and applied at the time of update to automatically restore the impacted files.

Based on our investigation, we would like to assure all our retail, enterprise, and government customers that their data safety is our utmost priority. Our cybersecurity solutions with comprehensive protection and sophisticated controls are fully capable to neutralize any such threat.

What led to this false positive detection?

  • The issue was caused because of a signature that was targeted to detect XML files being used by malware in wild. Inadvertently though, the signature also detected XML content within some legitimate excel files, thus resulting in this False Positive.
  • Many signatures are written every day. They are pushed out to end devices in form of AV Updates, multiple times a day. Each update cycle picks all the signatures that were newly created since the last cycle and combines them into a package. This package is then released to customers, and is downloaded & applied on end devices via live update functionality.
  • Each update package, before release, goes through extensive testing to ensure its contents will not have any side effects on the end user devices. If the contents of the update package have a False Positive risk, an alert is generated. And, when that happens, the respective signature is removed from the package. In this case though, owing to a human error in a non-automated step, the alarm was not generated. Thus, resulting in release of the offending signature.

How do we intended to mitigate this occurrence in future?

  • Majority of the pre-release testing happens via automated systems. These automations are being enhanced to include the step where the error happened.
  • Additionally, the entire testing suite is being thoroughly reviewed. As part of this review, other human intervention steps would be considered for inclusion in automation as well. Also, this review will help identify any other blind spots.
  • Existing monitoring systems will be enhanced to cover the identified blind spots. Also, there are existing checklists that are used in steps requiring human intervention would be enhanced to cover any current gaps.

Please write to us at support@quickheal.com for any clarification.

 Previous Post9 Best Practices to Avoid Ransomware Infection
Next Post  Calling from the Underground: An alternative way to penetrate cor...
Seqrite

About Seqrite

Follow us for the latest updates and insights related to security for enterprise networks. Subscribe to our newsletter to stay...

Articles by Seqrite »

Related Posts

  • WordPress Site Security Alert: Bookly Plugin Vulnerability Discovered and Patched

    March 29, 2023
  • Expiro: Old Virus Resurfaces to Cast New Challenge

    February 27, 2023
  • 9 Best Practices to Avoid Ransomware Infection

    October 10, 2022

No Comments

Leave a Reply.Your email address will not be published.
Cancel reply

CAPTCHA Image
Refresh Image

Popular Posts
  • 5 Security measures you should take to protect your organization’s network 5 Security measures you should take to protect your organization’s network August 11, 2017
  • Benefits of having Intrusion Prevention/Detection System in your enterprise Benefits of having Intrusion Prevention/Detection System in your enterprise February 15, 2018
  • Uncovering LockBit Black’s Attack Chain and Anti-forensic activity Uncovering LockBit Black’s Attack Chain and Anti-forensic activity February 1, 2023
Featured Authors
  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director and Chief Technology Officer of...

    Read more..
  • Jayesh Kulkarni
    Jayesh Kulkarni

    Jayesh is working as a Security Researcher for a couple of years. He likes to...

    Read more..
Stay Updated!
Topics
apt (11) Cyber-attack (32) cyber-attacks (56) cyberattack (11) cyberattacks (12) Cybersecurity (301) cyber security (26) Cyber threat (29) cyber threats (44) Data (11) data breach (50) data breaches (27) data loss (28) data loss prevention (33) data protection (21) data security (13) DLP (49) Encryption (16) endpoint security (103) Enterprise security (15) EPS (10) Exploit (12) firewall (11) hackers (11) IoT (10) malware (64) malware attack (23) malware attacks (12) MDM (25) Microsoft (14) Network security (18) Patch Management (12) phishing (18) Ransomware (60) ransomware attack (29) ransomware attacks (30) ransomware protection (12) security (10) Seqrite (26) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (15) windows (11)
Products
  • Seqrite MSSP Portal
  • HawkkScan
  • HawkkProtect
  • HawkkHunt XDR
  • HawkkEye
  • HawkkEye Endpoint Security Cloud
  • HawkkEye mSuite
  • HawkkEye Workspace
  • Endpoint Security (EPS)
  • Unified Threat Management
  • Antivirus for Server
  • Antivirus for Linux
Resources
  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies
About Us
  • Company Overview
  • Leadership
  • Why choose SEQRITE?
  • Awards & Certifications
  • Newsroom
Archives
  • By Date
  • By Category

© 2022 Quick Heal Technologies Ltd. Cookie Policies Privacy Policies

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website.
By browsing this website, you agree to our cookie policy.