• News
  • Security
  • Products
  • About Seqrite
Blogs on Information Technology, Network & Cybersecurity | Seqrite Blog
  • News
  • Security
  • Products
  • About Seqrite

Tag: malware

Become a leader in creating cyber trust with Seqrite Endpoint Security

Become a leader in creating cyber trust with Seqrite Endpoint Security

Estimated reading time: 3 minutes

Enterprises, big and small, all over the world, are waking up to the importance of garnering cyber trust. In a digital age where technology only breaches new frontiers, cyber trust has become a key differentiator. Security breaches are not...
Read Blog
January 24, 2018
17
Shares

What are the major ingredients of cybersecurity in 2018?

What are the major ingredients of cybersecurity in 2018?

Estimated reading time: 3 minutes

2017 was a highly eventful year for cybersecurity experts as they incessantly kept combating the proliferating security incidents with considerable success. While a few incidents grabbed the headlines, a majority of cyber-attacks went unannounced. Now in 2018, it seems...
Read Blog
January 4, 2018
3
Shares

How hackers name malware and vulnerabilities?

How hackers name malware and vulnerabilities?

Estimated reading time: 3 minutes

Although there aren’t many predefined standards for naming malware and vulnerabilities, they are often segregated according to the genre, impact and even malicious functionalities. Moreover, giving unique names to the vulnerabilities is nearly impossible due to the expansive conglomerate...
Read Blog
December 7, 2017

IcedID – a new sophisticated banking Trojan: a technical analysis by Quick Heal Security Labs

IcedID – a new sophisticated banking Trojan: a technical analysis by Quick Heal Security Labs

Estimated reading time: 3 minutes

IcedID is a new player in the banking Trojan family. It has a modular architecture and capable of stealing banking credentials of the user by performing a man-in-the-middle attack (MITM). IcedID sets up a local proxy and redirects all...
Read Blog
December 1, 2017

Vulnerabilities are unavoidable: Here are the top 5 commandments of Vulnerability Scan

Vulnerabilities are unavoidable: Here are the top 5 commandments of Vulnerability Scan

Estimated reading time: 3 minutes

Organizations using software modules are more likely to get affected by intruders and unsolicited access. Moreover, if the software is popular, there are additional chances that the connected services and written codes might attract hackers and malicious parties. Security...
Read Blog
November 14, 2017

New breeds of ransomware: Who’s at risk?

New breeds of ransomware: Who’s at risk?

Estimated reading time: 3 minutes

While ransomware threats keep bothering businesses regardless of their stature and size, organizations are slowly but steadily resorting to proactivity, to prevent infections and potential sabotages. The most frightening aspect of ransomware attacks is the evolution and sophistication on...
Read Blog
November 9, 2017

Spotted a breach? Know more about the after-effects of a security incident

Spotted a breach? Know more about the after-effects of a security incident

Estimated reading time: 3 minutes

Data breaches have now become a common occurrence but with myriad legislations in place— including the likes of GDPR— stakes for the enterprises are at an all-time high. When it comes to handling a breach, companies depend on the...
Read Blog
October 20, 2017

How to defend your organization’s data on both sides of the perimeter?

How to defend your organization’s data on both sides of the perimeter?

Estimated reading time: 2 minutes

Defending the organizational perimeter from data breaches forms the crux of an existing security strategy. Neutralizing potential damages emanating out of cybersecurity threats is possible only if the data sets are secured across both sides of the perimeter. When...
Read Blog
October 13, 2017

Cybercriminals know the importance of your data. Do you?

Cybercriminals know the importance of your data. Do you?

Estimated reading time: 3 minutes

Educating oneself when it comes to cybersecurity is extremely important and should always be stressed upon. A better understanding of this subject increases the chances of staying safe from the existing threats. More often than not, the importance of...
Read Blog
October 10, 2017

Strengthen your Enterprise Security with Seqrite EPS

Strengthen your Enterprise Security with Seqrite EPS

Estimated reading time: 3 minutes

With the increase in mobility of users, their usage and the access to the organization’s information assets extending to off-campus locations, the security perimeter keeps continuously changing.  This has led to a situation that a simple security solution within...
Read Blog
October 6, 2017
← Previous 1 … 6 7 8 Next →
Featured Authors
  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director of Quick Heal Technologies...

    Read more..
  • Mahua Chakrabarthy
    Mahua Chakrabarthy

    A tea connoisseur who firmly believes that life is too short for dull content....

    Read more..
Topics
apt (19) Cyber-attack (35) cyber-attacks (58) cyberattack (16) cyberattacks (13) Cybersecurity (319) cyber security (30) Cyber threat (33) cyber threats (48) Data (11) data breach (55) data breaches (28) data loss (28) data loss prevention (34) data protection (24) data security (15) DLP (49) Encryption (16) endpoint security (106) Enterprise security (17) Exploit (14) firewall (11) GDPR (12) hackers (11) IoT (10) malware (76) malware attack (23) malware attacks (12) MDM (25) Microsoft (15) Network security (22) Patch Management (12) phishing (27) Ransomware (67) ransomware attack (30) ransomware attacks (30) ransomware protection (13) security (11) Seqrite (33) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (16) windows (11)
Loading
Resources
  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies
About Us
  • About Seqrite
  • Leadership
  • Awards & Certifications
  • Newsroom
Archives
  • By Date
  • By Category
Loading

© 2025 Quick Heal Technologies Ltd. Cookie Policies Privacy Policies