IT and Business Insights for SMB Solution Providers

Technology

Blog Entry
January 27th, 2022 | Jay Ferron
 LockBit is the latest ransomware gang whose Linux encryptor has been discovered to be focusing on the encryption of VMware ESXi virtual machines. The enterprise is increasingly moving to virtual machines to save computer resources, consolidate servers, and for easier backups. - read more
 
Blog Entry
January 19th, 2022 | Jay Ferron
  - read more
 
Blog Entry
January 19th, 2022 | Jay Ferron
 In response to recent malicious cyber incidents in Ukraine—including the defacement of government websites and the presence of potentially destructive malware on Ukrainian systems—CISA has published CISA Insights: Implement Cybersecurity Measures Now to Protect Against Pot - read more
 
Blog Entry
January 19th, 2022 | Jay Ferron
 
Blog Entry
January 19th, 2022 | Jay Ferron
 Zoho has released a security advisory to address an authentication bypass vulnerability (CVE-2021-44757) in ManageEngine Desktop Central and Desktop Central MSP. An attacker could exploit this vulnerability to take control of an affected system. - read more
 
Blog Entry
January 12th, 2022 | Jay Ferron
NCCoE Releases Draft Project Description for IPv6 Transition - read more
 
Blog Entry
January 12th, 2022 | Jay Ferron
  Blockchain for Access Control Systems: Draft NISTIR 8403 Available for Comment - read more
 
Blog Entry
January 12th, 2022 | Jay Ferron
  Public comments will close on January 17 for Volume C of NIST SP 1800-34, Validating the Integrity of Computing Devices  - read more
 
Blog Entry
January 12th, 2022 | Jay Ferron
 Following our discovery of the “Shrootless” vulnerability, Microsoft uncovered a new macOS vulnerability, “powerdir,” that could allow an attacker to bypass the operating system’s Transparency, Consent, and Control (TCC) technology, thereby gaining unauthorized access to a user’s protected data. - read more
 
Blog Entry
January 12th, 2022 | Jay Ferron
The operators of the SFile ransomware, also known as Escal, have ported their malware to work and encrypt files on Linux-based operating systems. - read more
 

Pages

Subscribe to Technology