Beazly recently presented a report about the cases of ransonware occurred last year.
In this report, Beazley Breach Response Services (BBR) noted that 70% of the total number of attacks targeted small and medium companies, especially those that do not block the remote desktop protocol (RDP). This report is based on 3300 analyzed cases. Continue reading 70% of Ransomware Attacks Targeted SMBs, BEC Attacks Increased by 130%
On the 20th February 2019, Alert Logic research teams began tracking vulnerabilities affecting users of Jenkins which could allow an attacker to run malicious software remotely. That same day new detection content was deployed to monitor for abuse and over the following hours teams in research and security operations began managing exploit attempts in the wild and raising incidents to customers. Continue reading Emerging Threat Jenkins Plugins Remote Code Execution
Kubernetes version 1.12 released in September 2018 includes new features, critical updates and changes. Here are some highlights of the latest release: Continue reading Find out what’s new in Kubernetes Version 1.12
Every modern browser like Google Chrome, Mozilla Firefox, Apple Opera, and Microsoft Edge comes with a built-in password manager tool that allows the user to save their login information for automatic form filling. These browser-based password managers are designed to automatically detect login forms for the user on a webpage and automatically fill-in the saved credentials accordingly. Continue reading Is Managing your Password with Web Browser Safe?
In today’s world, one of the easiest ways of being hacked is by phishing. Phishing refers to the method of using misleading emails and websites to gather personal and confidential information about another person or organization. Phishing is a highly sophisticated cyber-attack that is becoming increasingly popular among hackers and affecting anyone who mistakes a deceptive email for a legitimate one. Continue reading Dual Authentication Prevents Phishing
Containerization application is an OS-level virtualization method used to deploy and run distributed applications without launching an entire virtual machine (VM) for each app. Kubernetes is open-source software designed to run and coordinate containerized applications across multiple devices. Created and developed by Google engineers, Kubernetes is the software behind Google’s cloud services. Continue reading What is Kubernetes and why would you use it?
Recently, a VPNFilter botnet which was built by Russian cyberspies infected over 500,000 routers and was finally taken down a few weeks ago by the FBI. VPNFilter malware is a complex piece of malware that infects older personal and commercial routers. They are capable of eavesdropping on traffic passing through routers especially tracking login information and other confidential credentials. Continue reading How to protect yourself from VPNFilter Botnet Malware
Skype for Business, a unified communications (UC) platform that integrates common channels of business communication and online meetings, including instant messaging (IM), presence, voice over IP (VoIP), voicemail, file transfers, video conferencing, web conferencing and email, has finally become HIPAA compliant. HIPAA is the Health Insurance Portability and Accountability Act which helps to set the standard for the protection of patient’s data. HIPAA/HITECH applies to companies, businesses, and organizations who provide service functions using individually identifiable health information. Continue reading Skype for Business HIPAA Compliance
Facebook is one of the most popular social media websites. Based in California, it was founded in 2004 by Mark Zuckerberg along with fellow Harvard College students and roommates. Since its creation, as of 4thquarter 2017, the popular social media site has grown to have2.2 billion monthly active users. Continue reading Cambridge Analytica harvested private data from the Facebook users’ profiles — How you can protect your data on Facebook
There’s a massive culture shift occurring in enterprise IT operations and software development departments. But many businesses still operate in traditional methods, discouraging innovation and making it challenging to meet end-user expectations. To stay competitive, enterprises need to meet end users’ expectations, rapidly respond to consumer demands and organizations must ensure that their software, services, and applications integrate efficiently in the cloud. Continue reading DevOps (Dev + Ops) – The buzz that never ENDS!