Estimated reading time: 4 minutes
In today’s interconnected digital world, traditional security models that rely on a secure network perimeter are no longer sufficient to protect against sophisticated cyber threats. That’s where zero trust security comes into play. Zero trust is a security strategy...Information Technology, Network Security & Cybersecurity Updates
![Cyber Security in Automotive Supply Chain: Challenges and Solutions](https://www.seqrite.com/blog/wp-content/uploads/2024/02/SEQRITE-Blog-automotive-supply-chain-150x110.png)
Estimated reading time: 3 minutes
The first India Cyber Threat Report 2023 revealed the automotive supply chain as the most cyberattacked sector. Over the past three to four years, the global adoption of Industry 4.0 has marked a transformative trend, witnessing extensive digitalization integration...![Traversing the Cyber Threat Terrain in 2024: Insights, Expert Guidance, and Collective Resilience](https://www.seqrite.com/blog/wp-content/uploads/2024/02/SEQRITE-Blog-threat-report-150x110.png)
Estimated reading time: 2 minutes
The year 2023 was eventful, witnessing a myriad of advanced threats targeting prominent economies, including India. Many still remember the fake IRCTC app that stole sensitive user information or the infamous loan apps that devastated many innocent lives. Malware...![Navigating India’s Data Protection Landscape: A SEQRITE Perspective](https://www.seqrite.com/blog/wp-content/uploads/2024/01/SEQRITE-Blog-new-DPDP-150x110.png)
Estimated reading time: 3 minutes
India’s swift enactment of the Digital Personal Data Protection (DPDP) Act has triggered considerable apprehension among businesses, mainly due to the impending deadline for compliance. Several myths regarding the Act have further intensified the confusion. To educate the business...![How To Prevent Remote Ransomware: The Easy Way](https://www.seqrite.com/blog/wp-content/uploads/2024/01/SEQRITE-Blog-new-remote-working-1-150x110.png)
Estimated reading time: 4 minutes
Ransomware attacks today have become increasingly prevalent and sophisticated. One such alarming trend is the surge in remote ransomware attacks, also known as malicious remote encryption. This attack vector involves using compromised endpoints to encrypt data on other devices...![Operation RusticWeb targets Indian Govt: From Rust-based malware to Web-service exfiltration](https://www.seqrite.com/blog/wp-content/uploads/2023/12/SEQRITE-Blog-new-Dec23-3-150x110.png)
Estimated reading time: 11 minutes
SEQRITE Labs APT-Team has uncovered a phishing campaign targeting various Indian government personnel since October 2023. We have also identified targeting of both government and private entities in the defence sector over December. New Rust-based payloads and encrypted PowerShell commands have been utilized...