White Papers

Learn more about the security solutions offered by Seqrite to enable safe business operations

A deep dive into the working of organized initial-access-brokers (IAB) operations

A deep dive into the working of organized initial-access-brokers (IAB) operations

Quick Heal APT-Team (CTI) encountered a mass campaign where an attacker was found involved with an unidentified underground criminal organization engaged with initial access broking. The attacker was found using loaders, password stealers, and browser exploits. Read more about this in this whitepaper.

Threat Intelligence Feeds Strengthening your Cybersecurity with QUICK HEAL Technologies Ltd

Threat Intelligence Feeds Strengthening your Cybersecurity with QUICK HEAL Technologies Ltd

Cyber-criminals have created numerous ways to deliver malware and execute attacks through internet. Threat intelligence is the practice of acquiring, gathering, analyzing, and sharing information to manage the cyber security risks. It is one of the best ways to keep an individual or organization safe.

A Paradigm Shift in Endpoint Security with next-gen EDR Solution

A Paradigm Shift in Endpoint Security with next-gen EDR Solution

With increasing cyberattacks, organizations these days require a layered and holistic security posture to protect their endpoints, look for behavioral anomalies, and prevent any attacks. Read the whitepaper to understand the paradigm shift in endpoint security with next-gen technologies and EDR solution.

Multi-Staged JSOutProx RAT Target Indian Co-Operative Banks and Finance Companies

Multi-Staged JSOutProx RAT Target Indian Co-Operative Banks and Finance Companies

Since early 2021, Quick Heal Security Labs has been monitoring various attack campaigns using JSOutProx malware, which is a highly obfuscated & complex JavaScript JavaScript-based RAT. Most of these attacks are targeted against different small and medium businesses in the Banking and Financial sectors.

Evolution of Spear-phishing attack

Evolution of Spear-phishing attack

Spear phishing is on the rise. Unlike regular phishing, where attacks are usually sent as bulk mail to full email databases, spear phishing uses individualized details that make it much harder to recognize. The whitepaper brings you different case studies, analysis, and how to protect yourself and your organization from these attacks. Download this whitepaper to read more.

Hackers Widely Abusing Excel 4.0 Macro to Distribute Malware

Hackers Widely Abusing Excel 4.0 Macro to Distribute Malware

Threat actors are increasingly adopting Excel 4.0 documents as an initial stage vector to distribute various malware. The biggest risk is for those targeted companies and individuals as this malware is hard to detect. Read our detailed analysis on the attack to know more.

Analyzing The Revil Ransomware Attack

Analyzing The Revil Ransomware Attack

2021 saw some major Ransomware attacks with the highlight being the Kaseya Revil Ransomware attack. This whitepaper represents a technical analysis of REvil ransomware and Kaseya attack along with the different techniques used by cybercriminals.

Operation SideCopy Returns: Targeting Critical Indian Infrastructure

Operation SideCopy Returns: Targeting Critical Indian Infrastructure

Suspected SideCopy APT Group strikes again! This time targeting Indian Critical Infrastructure PSUs. This time the group has added new malware tools to its arsenal. We would urge everyone to stay alert and use robust security solutions to stay safe from the latest threat.

Quick Heal's Web Filtering Service

Quick Heal's Web Filtering Service

Quick Heal’s Web Filtering Service provide the most effective way to block access to unwanted content and protect users against web-based threats using real-time, Deep learning-based intelligence. Read our Whitepaper to know more.

Operation SideCopy

Operation SideCopy

Quick Heal’s threat intelligence team recently uncovered evidence of an advanced persistence threat (APT) against Indian defence forces. Explore an in-depth and interesting analysis of this attack through this paper.

Seqrite cybersecurity below the kernel

Seqrite cybersecurity below the kernel

Security of a computing endpoint is traditionally viewed concerning Firewall, HIPS, AV Products, etc. while missing out on the ‘Below Kernel’ aspects of cyber threats. This whitepaper comprehensively talks about the Security aspects of system architecture, BIOS, UEFI, Windows boot and different security arrangements below kernel space.

Seqrite Encryption Support for Windows 10 20H1

Seqrite Encryption Support for Windows 10 20H1

This document discusses the release of a new update for Seqrite Encryption Manager to work in tandem with the latest version of Windows 10, the 20H1.

Apache Kafka - Scaling server capabilities

Apache Kafka - Scaling server capabilities

Integrating Apache Kafka’s capabilities in Seqrite’s products has accelerated the latter, light years ahead of the competition. Discover how, through this paper.

Transparent Tribe Targeting Critical Indian Organizations

Transparent Tribe Targeting Critical Indian Organizations

Quick Heal has been tracking Advanced Persistent Threats (APTs) attacking the military since 2016, under the name operation m_project. Find out the modus operandi of attackers through this interesting paper.

Seqrite introduces the Roaming Client feature

Seqrite introduces the Roaming Client feature

Most cybersecurity companies provide threat protection to endpoints inside enterprise networks. However, the same endpoints become vulnerable to cyber threats outside business networks. This paper describes Seqrite’s unique solution to resolve this problem.

Looking through the Glass - Application Performance Testing

Looking through the Glass - Application Performance Testing

This whitepaper is an attempt to throw light on debugging common performance bottlenecks of Windows operating system using available Windows tools.

MongoDB's makeover uplifts Seqrite's award-winning Endpoint Security

MongoDB's makeover uplifts Seqrite's award-winning Endpoint Security

Seqrite Endpoint Security Cloud's latest release, version 1.3, comes with improved scalability that lets enterprises increase the number of endpoints from 20k to 50k with the same set of hardware configurations. This was achieved by applying myriad modifications to the existing setup. This paper specifically talks about optimizations done towards performance, at the application and MongoDB level.

Mac Malware - The Apple of virus developers eye

Mac Malware - The Apple of virus developers eye

This whitepaper addresses the most common misconceptions related to macOS security and why built in protections are not enough to protect Mac systems. Consequently, Apple Mac users should not be complacent about security and should take precautions in order to prevent their devices from being compromised.

Seven threats to corporate data on mobile devices

Seven threats to corporate data on mobile devices

This white paper describes potential threats to devices, which include malicious mobile apps, phishing scams, data leakage, spyware, and unsecure Wi-Fi networks. It also describes the measures taken to protect sensitive data stored on portable devices. This paper also guides you to prevent unauthorized users from accessing your mobile devices.

Advantages of Seqrite UEM

Advantages of Seqrite UEM

This whitepaper explains how the ever-changing world of technology demands a centralised, multi-tenant platform for offering security services at reduced cost, near-zero maintainability and how UEM, a cloud management platform offers a centralized, cost-effective and scalable endpoint security management solution for its customers.