FBI Obtains Authorization to Access US Servers to Remove Webshells Due to Exchange Vulnerability
Your server could have been compromised and the FBI was trying to mitigate the issue without you even knowing it yet. Yesterday the Department of Justice revealed in a statement that the FBI was granted access to remove web shells that were installed on compromised web servers. These web servers are related to the Microsoft […]
Together, Scale Computing and Acronis Make Data Protection Easy (and More Affordable)
By Mitch Etchason IT pros are under enormous pressure to protect every piece of data without impacting production systems. A daunting task for sure, but it doesn’t have to be a difficult one. Thanks to a new Scale Computing Business Resiliency System (BRS) appliance and a special, limited-time offer, we’re making data protection not just […]
DHCP server monitoring made easy with OpUtils
By Sharon Abraham In today’s complex IT infrastructures, Dynamic Host Configuration Protocol (DHCP) servers play an indispensable role in automating IP allocation and configuration. A DHCP server’s capacity to allocate IPs to the requesting clients in real-time is one of the factors that ensures constant uptime of dynamic networks. However, even though a network’s availability […]
Operation panopticon: How a weak IAM strategy led to the security camera hack across organizations
By Abhilash On March 9, 2021, Verkada, a software company that specializes in making security cameras for monitoring physical access control, was subject to a security hack. Hackers gained access to the video feed of at least 15 thousand cameras deployed across various locations and exposed the inner workings of hospitals, clinics, and mental health […]
Five worthy reads: Location intelligence—the key to next-level data utilization
Five worthy reads is a regular column on five noteworthy items we’ve discovered while researching trending and timeless topics. This week we explore the rising scope of location intelligence in improving the overall customer experience. By Abirami A The pandemic has pushed businesses out of their comfort zones and boosted digitization. Organizations have started to […]
2021 Phishing Trends Face Alarming Predictions and Will Likely Include Automated Attacks
Researchers at INKY warn that targeted phishing attacks will continue throughout 2021, as some employees return to the office and others continue working from home. They predict that spear phishing attacks will begin to grow more automated, allowing more attackers to launch these attacks. The researchers expect to see the following five trends for the […]
Five worthy reads: The unexpected costs following a cyberattack
Five worthy reads is a regular column on five noteworthy items we’ve discovered while researching trending and timeless topics. In this edition, we’ll learn about the worst data breaches that happened recently, their impact, and the cost of data breaches for companies. The COVID-19 pandemic has not only had an impact on the mental and […]
Is the cloud coming to all of us?
By Muhammad Firdaus During the past twenty years, so much has changed in the IT office. Two decades ago, we were still using dial-up modems. Now, the entire world wide web is at our fingertips, and our world of IT is more efficient but complicated too. A few significant IT trends have also developed during […]
Microsoft Patch Tuesday April 2021 fixes 108 vulnerabilities, including 5 zero-days
By Gokila Kumar Yet another month, yet another Patch Tuesday. With the never-ending cybersecurity threats brought on by the pandemic, it’s essential to understand the importance of Patch Tuesday releases and find ways to efficiently deploy the new updates to remote endpoints. This Patch Tuesday, Microsoft has released fixes for 108 vulnerabilities, among which 19 […]
3 Ways To Protect Your Identity Online
Within security awareness training programs, cybersecurity experts promote various tactics and best practices to implement within personal and work environments to protect your identities online and reduce the risk of theft or privacy loss. While these concepts seem like a broken record to some people, here are 3 best practices that can significantly reduce the […]