Category: Vendor News

Cybercriminals Lean Heavily on Social Engineering Tactics to Gain Access to Bank Accounts

A series of attack anecdotes shared by Brian Krebs shows how persistent and sophisticated scammers are in using social engineering tactics to gain access to their victim’s bank account details. It all starts with a bit of information about their next potential victim; using credit card records for sale on the dark web, scammers begin […]

Fake Zoom Downloader is the Latest Method of Attack on Remote Workers

Riding on the coattails of the massive rise in popularity in the video conference solution, remote workers new to Zoom need to be wary of where they download the installer. We’ve written before about the various types of Zoom-related attacks that have sprouted up over the last two months. The latest chapter in this saga […]

It Starts with a Phish: Employee PII at Risk When Pipeline Development Outsourcer Falls Victim to Ransomware Attack

The latest example of a modern-day ransomware attack demonstrates how data encryption and ransom can no longer be the assume extent of an attack. Two weeks ago, outsourcing service provider ExecuPharm released a notice of data breach to their consumers. In it, ExecuPharm noted experiencing a ransomware attack in March of this year where “employees […]

5 major risks that impact vulnerable network devices

Working from home has become our new normal, with many of our jobs being performed remotely. The experience of working remotely can be as seamless as it was from our workplace, with all the technological advancements available today. Businesses have also put network security on the forefront by implementing use of virtual private networks (VPNs). […]

Boot machines remotely with OpUtils: The Wake on LAN advantage

When businesses have a high number of computers, getting all of them turned on manually can be a herculean task for any network admin. This can lead to organizations keeping their computers on even when not in use. Of course, this approach is not ideal, as electricity bills would skyrocket in result. That said, there […]

Remote work: Governing and guiding end users

With remote work being the new normal thanks to the ongoing pandemic, enterprises are facing the dilemma of how to update and secure all their network endpoints while managing devices efficiently. Many businesses have adapted their operations to a remote work model. As a result, the increase in individuals working from home has put pressure […]

Can COVID-19 Related Data Breach Worries Stop Your Mergers Or Acquisitions?

The WSJ just reported that the new coronavirus has thrown the M&A dealmaking into disarray. They said: “cybersecurity experts say the workplace upheaval caused by the pandemic will complicate mergers and acquisitions when activity picks up. Countless employees are working remotely on networks that might be vulnerable to attack, while others with access to confidential […]

[Heads Up] Microsoft: Ransomware Gangs That Don’t Threaten To Leak Your Data Steal It Anyway

That means you can from now on count a ransomware infection as a data breach with all the consequences that this brings. Moreover, the so-called “human-operated” ransomware gangs have stepped up their attacks amid the pandemic to maximize their ill-gotten profits. In fact, Redmond also reported that they launched more of the file-encrypting malware on […]

What is modern management, and how will it revolutionize enterprise IT management?

IT departments have experienced numerous changes in the way they manage and control user devices. Starting with the traditional CRT monitor-based computers, to modern smartphones, technological developments have been remarkable. Additionally, with the COVID-19 pandemic, employees are restricted to work from home, making the IT administration routines challenging for system administrators. Nevertheless, devices and users […]

Top metrics to look out for while monitoring Node.js applications

Applications built on the Node.js platform, an event-driven I/O server-side JavaScript environment based on Google Chrome’s V8 engine, are known as Node.js applications. Since both the server-side and the client-side are written in JavaScript, Node.js facilitates easier and faster implementation of codes, and processes requests quickly and simultaneously; this is greatly beneficial for building real-time […]