Network scanners have become an integral part of every IT admin’s first line of defense against security breaches. Using the right network scanner tool to conduct effective network reconnaissance and diagnosis enables you to pinpoint network issues that can escalate to security risks and network mishaps. A typical network scanner would allow you to scan […]
Trickbot is Targeting the Legal Sector
Researchers at Menlo Security warn of an ongoing Trickbot campaign targeting the legal and insurance industries. Trickbot is a notorious remote access Trojan that was in the crosshairs of separate operations by US Cyber Command and Microsoft late last year. While these operations crippled the malware’s botnet ahead of the US elections, they weren’t expected […]
[Heads Up] Email Phishing Is Now the Top Ransomware Attack Vector
New data shows that pushback from the ransomware victim “market” may be influencing just how much cybercriminals are asking for as ransom and are being paid. 2020 seemed to point to ransomware continuing to grow in devastation and cost; Ryuk reached a $34 million ransom payout, organizations were operationally brought to their knees by many […]
Top Predictions in Service Provider Networks for 2021
The Fanciful and Serious Predictions of Post-pandemic Impact 2020 has been a challenging year for the entire world. Between the pandemic, shutdowns, wildfires and other natural disasters, most of us will look forward to a new year in 2021. Here are a few light-hearted predictions plus some more thoughtful reflections on what’s to come in […]
Beware the Long Con Phish
Social engineering and phishing happen when a con artist communicates a fraudulent message pretending to be a person or organization which a potential victim might trust in order to get the victim to reveal private information (e.g. a password or document) or perform another desired action (e.g. run a Trojan Horse malware program) that is […]
[HEADS UP] New Phishing Kit Spotted on Over 700 Domains
A cybercriminal gang has recently developed a new phishing kit named LogoKit on several domains. LogoKit changes logos and text in real-time in order to adapt to the targeted victims. This vicious phishing kit has already been released in the dark web according to threat intelligence firm RiskIQ. The firm has tracked it’s progression and […]
Why ManageEngine PAM360 is the ultimate privileged access management solution
At ManageEngine, we‘re building one of the most comprehensive and tightly integrated IT management software suites on the market. We have over 90 products and free tools to manage all your IT needs, including Active Directory management, help desk management, desktop and mobile device management, network and server management, application management, IT security, and analytics. […]
Five worthy reads: Supply chain cyberwarfare
Five worthy reads is a regular column on five noteworthy items we’ve discovered while researching trending and timeless topics. This week we are exploring the concept of supply chain cybersecurity in a time when there is a rising number of third-party cyberattacks. The top-of-the-mind priority for cybersecurity stakeholders is to secure the organizations’ IT assets […]
January 2021 Patch Tuesday fixes 83 vulnerabilities
As IT administrators do their best to cope with business continuity plans, it’s imperative that they understand and manage patch updates. With cybersecurity threats on the rise thanks to the pandemic, it is essential to gain a better understanding of the Patch Tuesday releases, and find ways to deploy them to remote endpoints efficiently. Microsoft […]
IT security under attack: Credential dumping attacks in Windows environments
Most of the time, threat actors in the cybersecurity landscape don’t employ advanced techniques and tools to intrude and establish a foothold within networks. Often, they disguise malicious operations by mimicking the activities of legitimate users, leaving behind little to no footprint. Blending malicious actions with day-to-day IT activities helps attackers maintain a low profile […]