Lesson from an enterprise implementation – Download PDF
Microsoft Exchange Autodiscover protocol found leaking hundreds of thousands of credentials. Email clients fail over to unexpected domains if they can’t find the right resources Exchange’s Autodiscover protocol, specifically the version based on POX XML, provides a way for client applications to obtain the configuration data necessary to communicate with the Exchange server. It gets […]
Epik data breach impacts 15 million users, including non-customers Epik, the domain registrar known for hosting several large organizations, has confirmed a hack of its systems, a week after attackers branding themselves with the Anonymous hacktivist collective label said that the group had obtained and leaked gigabits of data from the hosting company, including 15 […]
The article below is made possible by our Security Partner Fortinet. Ransomware is the hottest topic of the day. Every company needs to have a solid ransomware strategy in place. This is no surprise, as Fortinet’s FortiGuard Labs reported a more than 10X increase in ransomware activity in the last year. Resiliency and response are key. The industry average […]
The article below is made possible by our Security Partner Fortinet Phishing Definition A phishing attack is a type of cybersecurity threat that targets users directly through email, text, or direct messages. During one of these scams, the attacker will pose as a trusted contact to steal data like login, account numbers, and credit card […]
An LATG video recommendation. The YouTube Video below provides a fantastic 16 min journey into the future of servers for the new generation datacenters.
BlackMatter gang rapidly evolves, the group has developed a Linux version that allows operators to targets VMware’s ESXi VM platform. Check complete article here: https://securityaffairs.co/wordpress/120862/cyber-crime/blackmatter-ransomware-linux-version.html
Another exchange attack using the newly discovered Microsoft power shell vulnerability. Everyone need to patch to avoid possible attacks and ransomware, or alternatively have us do it! The three vulnerabilities were discovered by Devcore Principal Security Researcher Orange Tsai, who chained them together to take over a Microsoft Exchange server in April’s Pwn2Own 2021 hacking contest. Link […]