• News
  • Security
  • Products
  • About Seqrite
Blogs on Information Technology, Network & Cybersecurity | Seqrite Blog
  • News
  • Security
  • Products
  • About Seqrite

Cybersecurity Archive

Email campaign using .url extensions to abuse Internet Explorer vulnerabilities (CVE-2016-3353)

Email campaign using .url extensions to abuse Internet Explorer vulnerabilities (CVE-2016-3353)

Estimated reading time: 4 minutes

In the wild, malspam campaigns are a major medium to spread malware. Previously, we have written about such campaigns using MS Office files with malicious macro and using vulnerabilities. Recently, we observed a spam campaign that uses .url files...
Read Blog
March 14, 2018
5
Shares

Found new vulnerabilities: What’s next?

Found new vulnerabilities: What’s next?

Estimated reading time: 2 minutes

A big headache which all network administrators have is the vulnerability status of their business. With more and more business being conducted online, every organization has an online presence and network. Popular software attracts the attention of malicious criminals...
Read Blog
March 14, 2018
6
Shares

Top 5 questions SMBs should ask potential service providers

Top 5 questions SMBs should ask potential service providers

Estimated reading time: 3 minutes

SMBs are increasingly evaluating security vendors on the basis of their endpoint encryption services and other related features. While managed security services are mostly outsourced, a better part of an organization’s security posture depends on how the endpoints are...
Read Blog
March 13, 2018

Anonymous Cryptocurrency: Introduction to new security challenges

Anonymous Cryptocurrency: Introduction to new security challenges

Estimated reading time: 3 minutes

While the existing crypto-sphere is already plagued by issues concerning scalability, financial privacy is fast shaping us yet another prerequisite to sizeable investments. Individuals are constantly emphasizing on anonymous cryptocurrencies courtesy the flexibilities on offer. That said, we believe...
Read Blog
March 12, 2018

How to manage patches in mixed OS environments

How to manage patches in mixed OS environments

Estimated reading time: 3 minutes

The importance of patch management in today’s cybersecurity environment cannot be understated by organizations today. The world of cyber threats is a rapidly evolving and dynamic one. Hackers are hard at work at every hour and at every minute...
Read Blog
March 9, 2018

Big data leads to big breaches: Know the pitfalls

Big data leads to big breaches: Know the pitfalls

Estimated reading time: 3 minutes

The key theme of today’s day and age is “connected”. Whether it’s the Internet of Things (IoT), connected solutions and mobility, the world’s electronic devices are getting increasingly connected, which of course, the amount of information being collected as...
Read Blog
March 8, 2018
14
Shares

Seqrite Endpoint Security Cloud: The future of endpoint security

Seqrite Endpoint Security Cloud: The future of endpoint security

Estimated reading time: 3 minutes

Do you need to check your latest purchases list? Or do you need to find the report of the last medical check-up that you had undergone? Chances are that you wouldn’t need to dig through your physical wallets or...
Read Blog
March 7, 2018
9
Shares

How Cyber War Games can help you improve Incident Response Plan?

How Cyber War Games can help you improve Incident Response Plan?

Estimated reading time: 3 minutes

Ask any experienced network security expert and they will agree on the importance of having a strong, secure Incident Response Plan to safeguard an organization. After all, no security system is 100% foolproof and there is no guarantee that...
Read Blog
March 6, 2018
4
Shares

What is Personally Identifiable Information (PII)? How to protect it under GDPR?

What is Personally Identifiable Information (PII)? How to protect it under GDPR?

Estimated reading time: 3 minutes

Cybersecurity threats compel us to revisit certain identity-based terminologies and Personally Identifiable Information is probably one of the most important ones. Personally Identifiable Information (PII) signifies any substantial information or data that can help a governing body trace the...
Read Blog
March 5, 2018
11
Shares

Business network: The first point of entry for hackers

Business network: The first point of entry for hackers

Estimated reading time: 3 minutes

In the world of cybersecurity, business networks are particularly high-risk targets. Hackers are aware that business networks contain a number of endpoints, all of which can be exploited and which all can be vulnerable. Large business have thousands of...
Read Blog
March 2, 2018
11
Shares
← Previous 1 … 19 20 21 … 32 Next →
Featured Authors
  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director of Quick Heal Technologies...

    Read more..
  • Mahua Chakrabarthy
    Mahua Chakrabarthy

    A tea connoisseur who firmly believes that life is too short for dull content....

    Read more..
Topics
apt (19) Cyber-attack (35) cyber-attacks (58) cyberattack (16) cyberattacks (13) Cybersecurity (319) cyber security (30) Cyber threat (33) cyber threats (48) Data (11) data breach (55) data breaches (28) data loss (28) data loss prevention (34) data protection (24) data security (15) DLP (49) Encryption (16) endpoint security (106) Enterprise security (17) Exploit (14) firewall (11) GDPR (12) hackers (11) IoT (10) malware (76) malware attack (23) malware attacks (12) MDM (25) Microsoft (15) Network security (22) Patch Management (12) phishing (27) Ransomware (67) ransomware attack (30) ransomware attacks (30) ransomware protection (13) security (11) Seqrite (33) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (16) windows (11)
Loading
Resources
  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies
About Us
  • About Seqrite
  • Leadership
  • Awards & Certifications
  • Newsroom
Archives
  • By Date
  • By Category
Loading

© 2025 Quick Heal Technologies Ltd. Cookie Policies Privacy Policies