Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

Top Privileged Access Management (PAM) Solutions for Secure Access

The privileged accounts in your IT environment require special attention because they have elevated access to vital systems and sensitive data. The organization can suffer severe damage if they are misused by their owners or compromised in attacks. In addition, many compliance standards require organizations to maintain tight control over privileged access. Most organizations have hundreds or thousands of accounts with privileged access.

Understanding Common Ports Used in Networks for TCP and UDP Usage

Think of a port as a virtual gateway that a specific service, process, or application on your computer uses for network communication. Each port is assigned a unique number, allowing different types of traffic to be directed to the appropriate software. For example, your email might use one port, while your web browsing uses another. When combined with an IP address, a port number creates a complete socket address, enabling precise routing of data to and from your computer across the network.

GitProtect 1.8.5 release brings a big launch - Azure DevOps Backup and DR

We are so proud to announce that GitProtect Backup and Disaster Recovery for Azure DevOps is here! The 1.8.5 release also brings a few improvements – performance, UX, and more – and small fixes. Let’s dig into more details.

New Capability: Safeguard Your Sensitive Cloud Data With Rubrik Data Protection Insights

According to Cybersecurity Ventures, more than half of the world’s data will be stored in the cloud by 2025. With this growth comes a new challenge: understanding where your cloud data lives, what it contains, and how to ensure it is properly protected. The mass storage capabilities of the cloud means it’s easy to drop data wherever you want. It’s also easy to forget to clean up that data or set up backups where that data is required.

Backup ESXi Host Configuration: 4 Different Methods

Virtualization offers several advantages for backup and recovery operations, which are the backbone of data protection, operational continuity, and availability. Most importantly, virtualization makes agentless and image-based, host-level backups possible. These types of backups can capture the full VM, including VM configuration as well as VM data. However, it’s important to protect hosts too, as healthy ESXi hosts are important for VMs to run properly.

Trinity Ransomware Targets the Healthcare Sector

The Trinity ransomware gang is launching double-extortion attacks against organizations in the healthcare sector, according to an advisory from the US Department of Health and Human Services (HHS). The ransomware gains initial access via phishing emails or software vulnerabilities. “Trinity ransomware was first seen around May 2024,” the advisory says.

Google App Scripts Become the Latest Way to Establish Credibility and Automate Phishing Attacks

Cybercriminals have found a new way of leveraging legitimate web services for malicious purposes, this time with the benefit of added automation of campaign actions. Security researchers at CheckPoint have discovered a new phishing campaign that uses Google App Scripts – a scripting platform developed by Google that lets you integrate with and automate tasks across Google products – as the destination in malicious links.

The Howler Episode 13: Lane Roush, Chief Technical Customer Officer

This month we sit down with Lane Roush, Chief Technical Customer Officer, as he shares his philosophy on owning the outcome, his approach to wellbeing, his love for Halloween costumes and much more! Lane Roush has led the Arctic Wolf Sales Engineering organization since 2016. Lane brings 20+ years of IT and security experience to the team and has been a driving force in our sales, enablement, product, channel and go to market strategy.

The Mobile Phishing Boom and How to Avoid It

As mobile technology becomes integral to day-to-day life, fraudsters are refining phishing techniques to exploit vulnerabilities in mobile browsing. According to Zimperium’s 2024 zLabs Global Mobile Threat report, 82% of phishing sites specifically targeted mobile devices in 2023. To protect customer data, enterprises need to counter-adapt.