Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

Understanding the Risks of Remote Monitoring and Management Tools

On February 19, 2024, ConnectWise published a security bulletin detailing two critical vulnerabilities within their on-premises ScreenConnect software, stating that the vulnerabilities have the potential to result in remote code execution (RCE). ScreenConnect is a widely utilized Remote Monitoring and Management (RMM) tool that has been leveraged by threat actors in the past, often in connection with ransomware attacks.

Here's Why Regulatory Compliance is Important

You don’t have to jump through endless hoops to achieve regulatory compliance. By finding an easy way to comply with the right laws, regulations, and industry standards, regulatory compliance can offer several benefits for companies. Specific compliance requirements vary by industry and country. But in general, implementing regulatory compliance is a mandatory requirement for every sector and every company in countries with a robust business and economic landscape.

Commands | JumpCloud University Tutorial (2024)

In this tutorial, we'll cover how to add configure and run commands on your JumpCloud managed devices. JumpCloud commands allow admins to run custom commands via bash and PowerShell. To discover more resources checkout JumpCloud University where you’ll find courses, tutorial videos, engaging guided simulations, and end user content.

Are Google-Generated Passwords Safe?

Google’s auto-generated passwords aren’t typically the most secure as the character limit is 15. Having a limit of 15 characters prevents a user from creating longer passwords. The longer a password is, the harder it is for cybercriminals to crack. Continue reading to learn more about Google-generated passwords and why they are not the most secure option for your digital security.

What is Cloudforce One. How we thwarted FlyingYeti's campaign targeting Ukraine

In this week’s episode, we have a segment about how we thwarted a threat campaign targeting Ukraine and explain what our team, Cloudforce One, does. Host João Tomé is joined by Blake Darché, Head of Cloudforce One. First, we discuss how Cloudforce One employed proactive defense measures to successfully prevent Russia-aligned threat actor FlyingYeti from launching their latest phishing campaign targeting Ukraine.

The Public Role in the MSDB Database, No Proxies Allowed

SQL Agent proxies are a form of built-in service that allows the schedule and running of automated tasks within SQL Server. These tasks can perform various actions related to database management. The msdb database is a crucial system database in Microsoft SQL Server which primarily serves SQL server agents. These databases store information related to SQL Agent jobs, including their configuration, execution history, vital system tables and data.

How to Migrate CentOS 7 to AlmaLinux

Jump to Tutorial As of June 30, 2024, CentOS 7 will reach its end of life (EOL). That means it will no longer receive updates, bug fixes, critical security patches, or any new features. It is very important to migrate to a supported operating system to maintain the functionality and security of your systems. AlmaLinux is a reliable alternative to CentoOS. It’s a community-driven enterprise distribution that is binary compatible with Red Hat Enterprise Linux (RHEL).