Estimated reading time: 4 minutes
Email attachments are a favorite medium for attackers to deliver malware. They can be used to target a specific user or multiple users at the same time by launching spam email campaigns. To succeed in carrying out an intended...
Estimated reading time: 4 minutes
A breach at IRINN systems could have affected India’s over 6000 ISPs, Government and Private Organisations. We at Seqrite’s Cyber Intelligence Labs (https://seqrite.com) working closely with our Partner, seQtree InfoServices (https://seqtree.com/) recently tracked a broadcast advertisement on a Darknet...
Estimated reading time: 3 minutes
An increasing volume of business information assets are distributed digitally today and has been growing exponentially every year. Confidential and sensitive business information is no longer restricted to physical boundaries of business enterprises. With the implementation of policies like...