Estimated reading time: 4 minutes
Why 60% of enterprises are moving from VPNs to Zero Trust Network Access ? In today’s rapidly evolving digital landscape, organizations are grappling with the challenges posed by remote and hybrid work models. As the traditional enterprise perimeter continues...Information Technology, Network Security & Cybersecurity Updates
![Pakistani APTs Escalate Attacks on Indian Gov. Seqrite Labs Unveils Threats and Connections](https://www.seqrite.com/blog/wp-content/uploads/2024/04/SEQRITE-Blog-APT-1-150x110.png)
Estimated reading time: 11 minutes
In the recent past, cyberattacks on Indian government entities by Pakistan-linked APTs have gained significant momentum. Seqrite Labs APT team has discovered multiple such campaigns during telemetry analysis and hunting in the wild. One such threat group, SideCopy, has...![The 12 Essential Features Defining Advanced Endpoint Security Solutions](https://www.seqrite.com/blog/wp-content/uploads/2024/04/SEQRITE-Blog-12-feature-150x110.png)
Estimated reading time: 4 minutes
The 12 Essential Features Defining Advanced Endpoint Security Solution Endpoint security is a critical aspect of protecting an organization’s network and data from evolving threats. As the sophistication and abundance of endpoint threats continue to grow, advanced endpoint security...![Ghost Locker 2.0: The Evolving Threat of Ransomware-as-a-Service Unveiled by GhostSec](https://www.seqrite.com/blog/wp-content/uploads/2024/04/SEQRITE-Blog-Ghost-Locker-150x110.png)
Estimated reading time: 6 minutes
Ghost Locker is a Ransomware-as-a-Service (Raas) created by GhostSec [hacktivist groups]. In October 2023, GhostSec launched the GhostLocker framework. After their successful collaborative operations with the Stormous ransomware group in July 2023, GhostLocker ransomware operators provide various options for...![Exposing Coyote: The Next-Gen Banking Trojan Revolutionizing Cyber Threats in Brazil](https://www.seqrite.com/blog/wp-content/uploads/2024/04/SEQRITE-Blog-Exposing-coyote-150x110.png)
Estimated reading time: 4 minutes
Recently, we came across a new banking trojan called Coyote, which utilizes a tool/library called Squirrel Installer, developed to install and manage updates of windows applications. The malware looks more evolved than our normal banking trojans and can potentially...![Unveiling Abyss Locker: The Rapid Rise of a Menacing Ransomware Threat](https://www.seqrite.com/blog/wp-content/uploads/2024/04/SEQRITE-Blog-Unveiling-Abyss-Locker-150x110.png)
Estimated reading time: 4 minutes
Introduction: Originating in March 2023, Abyss Locker, a recently established ransomware operation, has swiftly targeted companies, transforming into a significant threat across various sectors, such as industrial control systems (ICS), enterprises, and public-sector organizations. It poses a significant threat...![Preparing the Manufacturing Industry for New Age Cyber Attacks](https://www.seqrite.com/blog/wp-content/uploads/2024/03/SEQRITE-Blog-manufacturing-1-150x110.png)
Estimated reading time: 3 minutes
In today’s interconnected world, the manufacturing industry is increasingly vulnerable to cyber-attacks. Recent incidents, such as the cyber attack on Suzuki motorcycles and the impact on billion-dollar companies like NVIDIA and Colonial Pipeline, highlight the devastating consequences of these...![What is Zero Trust Security?](https://www.seqrite.com/blog/wp-content/uploads/2024/02/SEQRITE-Blog-ZTNA-150x110.png)
Estimated reading time: 4 minutes
In today’s interconnected digital world, traditional security models that rely on a secure network perimeter are no longer sufficient to protect against sophisticated cyber threats. That’s where zero trust security comes into play. Zero trust is a security strategy...