• News
  • Security
  • Products
  • About
Seqrite Blog Blog
  • News
  • Security
  • Products
  • About

Negligent Employee: A dangerous internal cyber threat

Negligent employee
Sometimes, the biggest dangers come from within. As organizations cope with the changing world of cybersecurity which continues to evolve at a frantic pace, they sometimes forget to neglect the danger that stares at them in their face. The...
Read More
April 16, 2018
  • 7
    Shares

Malware in attachment? Stop them before they hit your organization’s security

Malware in Attachment?
Increasingly, hacker and other malicious criminals are increasing email attachments to inject malware into their targets. Malware disguised as an email attachment represents an easy target – the recipient of the mail may unknowingly open the attachment without even...
Read More
April 12, 2018
  • 4
    Shares

Seqrite AntiVirus for Linux: Protect your Linux against malware

Seqrite Antivirus for Linux
In the age of multi-OS platforms, it is not always easy to find the perfect cybersecurity solution for your software. Many of the common antivirus platforms today are designed for the purpose of the most popular ones, Windows and...
Read More
April 5, 2018

Back up can be your biggest business investment

world backup day, back up, dlp
In 2018, the line between physical and digital world is increasingly blurring. Today, no business can solely operate in just the physical sphere. The emergence of connected technologies means every company, big or small, has some digital functions. No doubt, the...
Read More
March 30, 2018
  • 8
    Shares

Cybersecurity Readiness Assessment by staging a fake attack

Organizations of all hues and shades nowadays invest a lot in cybersecurity and rightly so. The world is moving from just being digital to being hyperconnected and now an organization’s most confidential information could be on the cloud. Hence,...
Read More
March 29, 2018

Seqrite Endpoint Encryption Solutions: Key Features

Seqrite Endpoint Encryption
It is becoming increasingly difficult for organizations to handle data complexities, courtesy the expansive proliferation of devices and the associated information sets. Moreover, with hackers opting for tech-intensive intrusion strategies, the number of data breaches encountered on a daily...
Read More
March 26, 2018

Everything you need to know about the Facebook-Cambridge Analytica data breach

Facebook-Cambridge Analytica data breach
Unless you have been living under a rock, you must have obviously heard of the name Cambridge Analytica and felt the reactions arising from the scandal which threatens to rock the giant of social networking, Facebook. Things are only...
Read More
March 26, 2018
  • 27
    Shares

How ready are you for the evolution of ransomware?

Thanks to the widespread coverage that the WannaCry and the Petya attacks received in 2017, ransomware is no longer an unknown or misunderstood terms, especially for those whose work revolves around handling cybersecurity. In fact, ransomware – which basically refers to...
Read More
March 23, 2018
  • 7
    Shares

Machine learning use cases for security

A key buzzword in today’s inter-connected digital landscape is “machine learning”. The concept basically refers to computers learning from data instead of receiving explicit programming. Through such machine learning algorithms, computers are fed huge datasets and parse through them...
Read More
March 21, 2018
  • 7
    Shares

Prioritizing your cybersecurity: Where to start?

Cybersecurity encompasses a bigger picture and majority of c-suite IT executives are paying close attention to the existing threats and mitigation plans. While some companies are finding it hard to meet the demands related to digital transformation, there are...
Read More
March 20, 2018

An in-depth analysis of a new, emerging “.url” malware campaign

Last week, we had blogged about the emergence of a new attack vector ‘.url’ which is used to spread malware. In this blog post, we will deep-dive into the attack chain of this ‘.url’ vector and elaborate on the...
Read More
March 19, 2018
  • 5
    Shares

5 Must Have Features of a Network Security Solution

The changing dynamics of IT with its big data, mobile technologies, Bring Your Own Device (BYOD) and the Internet of Things have put an ever-increasing stress on the network as the threat landscape continues to broaden and advance at...
Read More
March 16, 2018
  • 6
    Shares

Hackers love organizations of all sizes

Hacking is the unauthorized entry into a computer or network with the individuals engaged in these activities referred to as hackers. Hackers alter system or security software and/or hardware of the computer or network to accomplish a goal that...
Read More
March 15, 2018
  • 9
    Shares

Email campaign using .url extensions to abuse Internet Explorer vulnerabilities (CVE-2016-3353)

In the wild, malspam campaigns are a major medium to spread malware. Previously, we have written about such campaigns using MS Office files with malicious macro and using vulnerabilities. Recently, we observed a spam campaign that uses .url files...
Read More
March 14, 2018
  • 5
    Shares

Found new vulnerabilities: What’s next?

A big headache which all network administrators have is the vulnerability status of their business. With more and more business being conducted online, every organization has an online presence and network. Popular software attracts the attention of malicious criminals...
Read More
March 14, 2018
  • 7
    Shares

Anonymous Cryptocurrency: Introduction to new security challenges

Anonymous Cryptocurrency
While the existing crypto-sphere is already plagued by issues concerning scalability, financial privacy is fast shaping us yet another prerequisite to sizeable investments. Individuals are constantly emphasizing on anonymous cryptocurrencies courtesy the flexibilities on offer. That said, we believe...
Read More
March 12, 2018

MIRUS – a cryptomining virus

Cryptocurrencies are all the vogue now. This has resulted in the emergence of increasing cryptocurrency mining activities. Several platforms make mining services available to users. One such platform that provides JavaScript cryptocurrency miners for websites is CoinHive. Recently, we have...
Read More
March 9, 2018
  • 1
    Share

Big data leads to big breaches: Know the pitfalls

The key theme of today’s day and age is “connected”. Whether it’s the Internet of Things (IoT), connected solutions and mobility, the world’s electronic devices are getting increasingly connected, which of course, the amount of information being collected as...
Read More
March 8, 2018
  • 14
    Shares

Chinese, Russian hackers counting on Apache Struts vulnerabilities – a report by Quick Heal Security Labs

Apache Struts is an open-source CMS based on MVC framework for developing Java EE Web Applications. Apache Struts has been widely used by many Fortune 100 companies and government agencies over the years for developing web applications. But, websites built using a CMS constantly need to...
Read More
March 7, 2018
  • 13
    Shares

Seqrite Endpoint Security Cloud: The future of endpoint security

Do you need to check your latest purchases list? Or do you need to find the report of the last medical check-up that you had undergone? Chances are that you wouldn’t need to dig through your physical wallets or...
Read More
March 7, 2018
  • 9
    Shares
1 2 … 15 Next →

Popular Posts

  • Everything you need to know about the Facebook-Cambridge Analytica data breach Everything you need to know about the Facebook-Cambridge Analytica data breach March 26, 2018
  • Business network: The first point of entry for hackers Business network: The first point of entry for hackers March 2, 2018
  • What is Personally Identifiable Information (PII)? How to protect it under GDPR? What is Personally Identifiable Information (PII)? How to protect it under GDPR? March 5, 2018

Featured Authors

  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Ankita Ashesh
    Ankita Ashesh

    Ankita is a Communications Strategist at Quick Heal with a passion for covering...

    Read more..
  • Rajib Singha
    Rajib Singha

    Rajib is an IT security news junkie and a computer security blogger at Quick...

    Read more..
Tweets by @Seqrite

Join our Newsletter

Sign up for our Newsletter and get regular cybersecurity round-ups delivered to your inbox.

Follow Us On

Topics

Cyber-attack (27) cyber-attacks (53) cybercriminals (6) Cybersecurity (151) cyber security (24) Cyber threat (28) cyber threats (44) Data backup (6) data breach (48) data breaches (27) data loss (28) data loss prevention (32) data protection (19) data security (13) DLP (42) Encryption (8) endpoint protection (6) endpoint security (69) Enterprise security (9) Exploit (7) firewall (8) gateway security (6) hackers (6) incident response plan (9) IoT (6) malware (22) malware attack (20) malware attacks (12) Network security (15) Patch Management (11) Petya (6) phishing (13) Ransomware (37) ransomware attack (29) ransomware attacks (29) ransomware protection (12) Seqrite (12) Seqrite Encryption (13) Seqrite Endpoint Security (6) Seqrite EPS (32) Seqrite Services (6) Unified Threat Management (7) UTM (19) Vulnerability (6) WannaCry (7)

Products

  • End Point Security (EPS)
  • Seqrite Encryption
  • Seqrite Endpoint Security Cloud
  • Mobile Device Management (MDM)
  • Cloud Security
  • Unified Threat Management
  • Antivirus for Server
  • Antivirus for Linux

Resources

  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies

About Us

  • Company Overview
  • Leadership
  • Why choose SEQRITE?
  • Awards & Certifications
  • Newsroom

Archives

  • By Date
  • By Category

© 2018 Quick Heal Technologies Ltd. (Formerly Known as Quick Heal Technologies Pvt. Ltd.)