Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

Massive Cyberattack on Mobile Guardian Wipes Data from Thousands of Student Devices

In a recent cybersecurity incident, a hacker breached Mobile Guardian, a widely used digital classroom management platform, and remotely wiped data from at least 13,000 student devices. Mobile Guardian, a partner of 'Google for Education,' offers comprehensive device management, secure web filtering, classroom management, and communication solutions for K-12 schools worldwide.

How to Backup and Restore KVM Virtual Machines | BDRSuite Demo

In this BDRSuite demo, I'll show you how to perform backup and restore for KVM BDRSuite offers agentless backup solutions for KVM. This eliminates the need to install backup agents on each VM, providing flexible storage, instant VM recovery, and centralized management for efficient KVM backup.

Windows Downdate: Downgrade Attacks Using Windows Updates

Downgrade attacks—also known as version-rollback attacks—are a type of attack designed to revert an immune, fully up-to-date software back to an older version. They allow malicious actors to expose and exploit previously fixed/patched vulnerabilities to compromise systems and gain unauthorized access.

Brivo Access: How to Grant Elevator Access to a Floor

Discover how to grant elevator access to a floor for non-credentialed users in Brivo Access. This tutorial guides administrators through the steps needed to ensure secure and efficient access management for visitors or temporary personnel. Enhance your building's access control with these easy-to-follow instructions. Perfect for administrators managing visitor access! Watch now to optimize your Brivo Access system!

The Cyber Helpline Named Finalist for 2024 Not-for-Profit Cyber Award

London, UK, August 7th, 2024 - We are proud to announce that The Cyber Helpline is a finalist in this year's National Cyber Awards, for the fourth year in a row! The awards are now in their sixth year which recognise outstanding contributions and achievements in cybersecurity. Our charity has been a finalist and won the prestigious Not for Profit Award in 2021, 2022 and 2023. As digital threats continue to grow, the importance of cybersecurity cannot be overstated.

Fortify Digital Resilience with Splunk + Cisco Talos Incident Response

On the day that Splunk officially became part of Cisco, our leadership outlined key ways we’d come together to support customers to achieve business-critical outcomes, noting: In the short time since then, we’ve already made significant strides, demonstrated by our announcements of: As we continue to build on this momentum, we’re excited to announce the availability of Cisco Talos Incident Response services to Splunk customers.

What the experts say: complexity is the greatest identity security challenge

The results of the yearly IDSA (Identity Defined Security Alliance) survey are out, revealing some surprising and insightful numbers. Let’s dive in! Identity: a growing priority Just how important is identity? The vast majority (73 percent) of respondents say it’s a top three priority, with 22 percent saying it’s the very top priority within their company’s security program.

Unleashing the Power of Microsoft Security with Trustwave

Tectonic shifts are occurring across the cyber landscape, and organizations are increasingly turning to Microsoft as a cornerstone of their security strategy. At Trustwave, we have been at the forefront of this trend, partnering with Microsoft for years to deliver unparalleled security solutions and outcomes for our clients. Microsoft 365 E5 has become a compelling option for many organizations due to its robust suite of productivity tools and integrated security features.

Upgrading Your Control Panel? Here's How to Perform a Seamless Panel Swap!

Need to replace or upgrade your control panel? Our latest video breaks down the process into easy steps! Learn how to efficiently replace or upgrade your control panel with our step-by-step guide. Discover how to search for the customer account, access the Panels tab, locate the panel you want to swap, and seamlessly enter and confirm the new panel information. Follow these straightforward instructions to complete the panel swap with ease. Connect with us for a smarter, more secure tomorrow.

62% of Phishing Emails Bypassed DMARC Checks in 1H of 2024

A report from Darktrace has found that 62% of phishing emails in the first half of 2024 were able to bypass DMARC verification checks in order to reach users’ inboxes. “Building on the insights from the 2023 End of Year Threat Report, an analysis of malicious emails detected by Darktrace / EMAIL in 2024 underscores the implication that email threats are increasingly capable of circumventing conventional email security tools,” the report says.