Feed: "Blogs on Information Technology, Network & Cybersecurity | Seqrite"
By: Amruta Wagh on Tuesday, June 10, 2025
By: Amruta Wagh on Tuesday, June 10, 2025
Security Flaws in eMagicOne Store Manager for WooCommerce in WordPress (CVE-2025-5058 and CVE-2025-4603)
Urgent warning! Critical vulnerabilities (CVE-2025-5058 & CVE-2025-4603) found in eMagicOne Store Manager for WooCommerce WordPress plugin. Learn about remote code execution risks from arbitrary file ...
www.seqrite.com
June 10, 2025 at 1:32 PM
Everybody can reply
UNG0002 Actors Weaponize LNK Files via ClickFix Fake CAPTCHA Pages Cybersecurity researchers at Seqrite Labs have identified a sophisticated espionage group designated as UNG0002 (Unknown Group 000...
#Cyberf="/hashtag/cyber" class="hover:underline text-blue-600 dark:text-sky-400 no-card-link">#cyber #Security/hashtag/security" class="hover:underline text-blue-600 dark:text-sky-400 no-card-link">#security #Cyber #Security #News #THREATS
Origin | Interest | Match
#Cyberf="/hashtag/cyber" class="hover:underline text-blue-600 dark:text-sky-400 no-card-link">#cyber #Security/hashtag/security" class="hover:underline text-blue-600 dark:text-sky-400 no-card-link">#security #Cyber #Security #News #THREATS
Origin | Interest | Match
July 17, 2025 at 12:00 PM
Everybody can reply
1 reposts
Researchers from Seqrite Labs' APT-Team explore the technical details of the XELERA ransomware campaign, which involves fake job descriptions targeted towards individuals aiming for various technical job positions at at the Food Corporation of India (FCI). www.seqrite.com/blog/xelera-...
February 14, 2025 at 10:05 AM
Everybody can reply
Seqrite Labs details Noisy Bear APT group using malicious campaign against Kazakhstan energy sector
https://www.byteseu.com/1359538/
A new report from Seqrite Labs APT-Team detailed a previously unknown threat actor, dubbed Noisy Bear, since April this year. The group targeted entities in …
https://www.byteseu.com/1359538/
A new report from Seqrite Labs APT-Team detailed a previously unknown threat actor, dubbed Noisy Bear, since April this year. The group targeted entities in …
Seqrite Labs details Noisy Bear APT group using malicious campaign against Kazakhstan energy sector - Bytes Europe
A new report from Seqrite Labs APT-Team detailed a previously unknown threat actor, dubbed Noisy Bear, since April this year. The group targeted entities in
www.byteseu.com
September 8, 2025 at 9:39 AM
Everybody can reply
北朝鮮のハッカーがソウルの諜報ファイルを武器にして韓国人を標的に
韓国政府と情報機関の職員を狙った大規模なスピアフィッシング攻撃では、国家情報機関のニュースレターが悪用され、被害者を誘い込んだ。
サイバーセキュリティ企業Seqriteは8月29日に発表した新たなレポートの中で、北朝鮮の支援を受けているとみられる国家レベルのハッキング集団APT37が大規模なスピアフィッシング攻撃の背後にいたことを明らかにした。
「韓国ファントム作戦」と名付けられたこの攻撃には2つの作戦が含まれており、その際にAPT37は韓国政府関係者や諜報員が関心を持つ文書を武器化した。
韓国政府と情報機関の職員を狙った大規模なスピアフィッシング攻撃では、国家情報機関のニュースレターが悪用され、被害者を誘い込んだ。
サイバーセキュリティ企業Seqriteは8月29日に発表した新たなレポートの中で、北朝鮮の支援を受けているとみられる国家レベルのハッキング集団APT37が大規模なスピアフィッシング攻撃の背後にいたことを明らかにした。
「韓国ファントム作戦」と名付けられたこの攻撃には2つの作戦が含まれており、その際にAPT37は韓国政府関係者や諜報員が関心を持つ文書を武器化した。
North Korean Hackers Weaponize Seoul Intelligence Files
Pyongyang-backed hacking group APT37 leveraged an internal South Korean intelligence briefing in a spear phishing campaign
www.infosecurity-magazine.com
September 2, 2025 at 1:09 PM
Everybody can reply
Feed: "Blogs on Information Technology, Network & Cybersecurity | Seqrite"
By: Bineesh P on Monday, July 7, 2025
By: Bineesh P on Monday, July 7, 2025
DPDP Act Compliance Checklist for Indian Businesses: What You Need to Do Now
A practical, ready-to-use DPDP Act compliance checklist for Indian organizations—from appointing a DPO and managing consent to breach response—helping you stay audit-ready and avoid hefty penalties.
www.seqrite.com
July 7, 2025 at 8:42 PM
Everybody can reply
台湾・日本を標的とする新たなサイバー攻撃 キャンペーン「Swan Vector」|セキュリティニュース
https://www.wacoca.com/news/2526532/
セキュリティ研究機関であるSeqrite Labsは、台湾と日本を標的にした高度な持続的標的型攻撃(APT)キャンペーン「Swan Vector」を発見したことを発表しました。この攻撃は、教育機関や機械工学業界をターゲッ [...]
https://www.wacoca.com/news/2526532/
セキュリティ研究機関であるSeqrite Labsは、台湾と日本を標的にした高度な持続的標的型攻撃(APT)キャンペーン「Swan Vector」を発見したことを発表しました。この攻撃は、教育機関や機械工学業界をターゲッ [...]
台湾・日本を標的とする新たなサイバー攻撃 キャンペーン「Swan Vector」|セキュリティニュース - WACOCA NEWS
セキュリティ研究機関であるSeqrite Labsは、台湾と日本を標的にした高度な持続的標的型攻撃(APT)キャンペーン「Swan Vector」を発見したことを発表しました。このサイバー攻撃は、教育機関や機械工学業界をターゲットとしており、偽の履歴書ファイルを装ったマルウェア配布が確認されています。
www.wacoca.com
May 16, 2025 at 9:29 AM
Everybody can reply
Researchers from Seqrite Labs' APT-Team analyse two Silent Lynx campaigns targeting the government entities of the National Bank of Kyrgyz Republic and the Ministry of Finance of Kyrgyzstan with a UN-Themed lure. www.seqrite.com/blog/silent-...
January 24, 2025 at 12:44 PM
Everybody can reply
1 likes
Seqrite Labs APT team has discovered lure documents being used by the Pakistan-linked APT group Transparent Tribe (APT36) to target Indian government and defence personnel. www.seqrite.com/blog/advisor...
May 7, 2025 at 9:36 AM
Everybody can reply
1 reposts
1 likes
Feed: "Blogs on Information Technology, Network & Cybersecurity | Seqrite"
By: Jyoti Karlekar on Monday, July 14, 2025
By: Jyoti Karlekar on Monday, July 14, 2025
From Alerts to Action: How an XDR Platform Transforms Your SOC Operations
Revolutionize your SOC with an XDR platform. Dramatically reduce false positives, unify security data, and automate threat response for true threats. Discover how a modern XDR platform simplifies operations and boosts cybersecurity efficiency.
www.seqrite.com
July 14, 2025 at 9:19 PM
Everybody can reply
Feed: "Blogs on Information Technology, Network & Cybersecurity | Seqrite"
By: Subhajeet Singha on Wednesday, July 23, 2025
By: Subhajeet Singha on Wednesday, July 23, 2025
Operation CargoTalon : UNG0901 Targets Russian Aerospace & Defense Sector using EAGLET implant.
Discover how threat actors behind Operation Cargotalon (Ung0901) are leveraging the Eaglet implant to infiltrate Russia’s aerospace defense sector. Learn about tactics, indicators of compromise (IOCs), and mitigation strategies.
www.seqrite.com
July 25, 2025 at 12:33 AM
Everybody can reply
Feed: "Blogs on Information Technology, Network & Cybersecurity | Seqrite"
By: Bineesh P on Tuesday, May 13, 2025
By: Bineesh P on Tuesday, May 13, 2025
Practical Steps to Comply with India’s DPDPA: A Guide for Businesses
The DPDPA is a critical step toward protecting personal data in India, and DPDPA compliance is a shared responsibility for all organizations.
www.seqrite.com
May 14, 2025 at 8:02 AM
Everybody can reply
Feed: "Blogs on Information Technology, Network & Cybersecurity | Seqrite"
By: Bineesh P on Thursday, September 25, 2025
By: Bineesh P on Thursday, September 25, 2025
Countdown to DPDP Rules: What to Expect from the Final DPDP Rules
The wait is almost over. The final Digital Personal Data Protection (DPDP) Rules are just days away, marking the next big step after the enactment of the DPDPA in 2023. With only a few days left, organizations must gear up to align with new obligations on data protection, governance, and accountability. Are you
www.seqrite.com
September 25, 2025 at 12:22 PM
Everybody can reply
Seqrite Labs' APT-Team examine the stages of the Swan Vector campaign targeting Taiwan & Japan with DLL implants. The campaign is aimed at educational institutes & the mechanical engineering industry, with lures aiming to deliver fake resumes of candidates as a decoy www.seqrite.com/blog/swan-ve...
May 13, 2025 at 9:27 AM
Everybody can reply
1 likes
Feed: "Blogs on Information Technology, Network & Cybersecurity | Seqrite"
By: Dhruvi Desai on Wednesday, May 7, 2025
By: Dhruvi Desai on Wednesday, May 7, 2025
GDPR vs. DPDP: A Guide for Businesses Navigating Global Data Privacy
Organizations manage personal data across multiple jurisdictions in today's interconnected digital economy, requiring a clear understanding of global data privacy frameworks.
www.seqrite.com
May 8, 2025 at 4:24 PM
Everybody can reply
UNG0002 Attacks Organizations with Weaponized LNK Files and Tools like Cobalt Strike and Metasploit Seqrite Labs APT-Team has recently unraveled the covert operations of a previously undocumented t...
#Cyber #Attack #Cyber #security/hashtag/Security" class="hover:underline text-blue-600 dark:text-sky-400 no-card-link">#Security #newsef="/hashtag/News" class="hover:underline text-blue-600 dark:text-sky-400 no-card-link">#News #Cybersecurity […]
[Original post on cyberpress.org]
#Cyber #Attack #Cyber #security/hashtag/Security" class="hover:underline text-blue-600 dark:text-sky-400 no-card-link">#Security #newsef="/hashtag/News" class="hover:underline text-blue-600 dark:text-sky-400 no-card-link">#News #Cybersecurity […]
[Original post on cyberpress.org]
July 22, 2025 at 5:54 AM
Everybody can reply
Feed: "Blogs on Information Technology, Network & Cybersecurity | Seqrite"
By: Jyoti Karlekar on Monday, June 9, 2025
By: Jyoti Karlekar on Monday, June 9, 2025
How Seqrite Endpoint Protection Blocks Non-Human Threats like Bots, Scripts, and Malware
Defend against silent, swift non-human threats like bots, scripts, and malware with Seqrite Endpoint Protection. Discover how our Seqrite EPP, featuring AI-driven behavioral detection, application con...
www.seqrite.com
June 9, 2025 at 12:08 PM
Everybody can reply
Feed: "Blogs on Information Technology, Network & Cybersecurity | Seqrite"
By: Nandini Seth on Friday, September 12, 2025
By: Nandini Seth on Friday, September 12, 2025
Echoleak- Send a prompt , extract secret from Copilot AI!( CVE-2025-32711)
Discover EchoLeak, a zero-click exploit that secretly hacks Microsoft 365 Copilot, exfiltrating sensitive corporate data without user action. Learn how this AI vulnerability works and essential mitigation steps to protect your organization from silent AI threats.
www.seqrite.com
September 12, 2025 at 10:02 PM
Everybody can reply
Feed: "Blogs on Information Technology, Network & Cybersecurity | Seqrite"
By: Seqrite on Thursday, September 11, 2025
By: Seqrite on Thursday, September 11, 2025
Malware Campaign Leverages SVGs, Email Attachments, and CDNs to Drop XWorm and Remcos via BAT Scripts
Dive deep into recent XWorm and Remcos malware campaigns. Our analysis unmasks how threat actors use obfuscated BAT files, PowerShell scripts, and even malicious SVG files to deliver fileless payloads and bypass security defenses.
www.seqrite.com
September 11, 2025 at 9:44 PM
Everybody can reply
Feed: "Blogs on Information Technology, Network & Cybersecurity | Seqrite"
By: Subhajeet Singha on Wednesday, July 16, 2025
By: Subhajeet Singha on Wednesday, July 16, 2025
UNG0002: Regional Threat Operations Tracked Across Multiple Asian Jurisdictions
Seqrite Labs exposes UNG0002, a South Asian threat actor targeting defense, aviation, gaming, and academia in Asia using Shadow RAT, INET RAT, Blister DLL, and ClickFix social engineering in Operation Cobalt Whisper & AmberMist.
www.seqrite.com
July 16, 2025 at 10:57 PM
Everybody can reply
Feed: "Blogs on Information Technology, Network & Cybersecurity | Seqrite"
By: Bineesh P on Wednesday, September 24, 2025
By: Bineesh P on Wednesday, September 24, 2025
Why Regional and Cooperative Banks Can No Longer Rely on Legacy VPNs
Legacy VPNs leave regional & cooperative banks vulnerable to over-privileged access, compliance gaps, and operational overhead. Discover why only Zero Trust / ZTNA can meet modern banking security needs and how Seqrite’s solution is tailored for India’s banking sector.
www.seqrite.com
September 24, 2025 at 12:28 PM
Everybody can reply
Seqrite Lab researchers look into an ongoing spear-phishing campaign leading to ValleyRAT. The threat actors are targeting Chinese individuals seeking engineering & technical roles in the FinTech, cryptocurrency exchange, & trading platform sectors. www.seqrite.com/blog/operati...
October 16, 2025 at 8:42 AM
Everybody can reply
1 saves
SnakeKeylogger: A Multistage Info Stealer Malware Campaign
Seqrite Labs have observed an interesting malicious campaign delivering SnakeKeylogger as a final payload to compromised systems.
www.seqrite.com/blog/snakeke...
Seqrite Labs have observed an interesting malicious campaign delivering SnakeKeylogger as a final payload to compromised systems.
www.seqrite.com/blog/snakeke...
SnakeKeylogger: Multistage Info Stealer Malware Analysis & Prevention
Analyze SnakeKeylogger, a sophisticated multistage info-stealer malware targeting credentials. Learn about its infection chain, TTPs, and prevention strategies.
www.seqrite.com
March 28, 2025 at 6:37 AM
Everybody can reply
Feed: "Blogs on Information Technology, Network & Cybersecurity | Seqrite"
By: Dhruvi Desai on Monday, May 12, 2025
By: Dhruvi Desai on Monday, May 12, 2025
Protect What Matters Most with Data Discovery and Classification
The path to resilient data privacy and governance begins with two foundational steps: Data Discovery and Classification.
www.seqrite.com
May 13, 2025 at 7:46 AM
Everybody can reply
Feed: "Blogs on Information Technology, Network & Cybersecurity | Seqrite"
By: Bineesh P on Wednesday, May 14, 2025
By: Bineesh P on Wednesday, May 14, 2025
Market Guide for Choosing the Right ZTNA Solution
By following a comprehensive guide, organizations can adopt a ZTNA solution that strengthens security and supports operational efficiency and scalability.
www.seqrite.com
May 15, 2025 at 8:15 AM
Everybody can reply