Security

Security – 4

Hackers Exploit Windows Quick Assist App to Deploy Black Basta Ransomware

Microsoft has warned customers about a new wave of social engineering attacks where cybercriminals exploit its Quick Assist app. The company acknowledged that a financially motivated threat actor (tracked as Storm-1811) has been deploying Black Basta ransomware since mid-April, posing a significant threat to users. Quick Assist is a remote assistance tool that helps to...

About Security

Welcome to the Security category page, your fortress for safeguarding digital assets. In an age where cyberthreats are ever-evolving, IT security is paramount. Here, you’ll find resources including best practices, tools, and strategies to protect networks, systems, and data. Whether you’re an IT professional looking to understand the basics or seeking advanced security solutions, or a business owner aiming to fortify your defenses, this page is your stronghold for cybersecurity knowledge.

LATEST

Security

What is Single Sign-On (SSO): Everything You Need to Know

When it comes to cloud services and security technology, IT and systems administrators should seriously consider having SSO implemented for greater convenience and security. What is single sign-on (SSO)? SSO is an authentication method that allows users to securely access multiple SaaS (Software-as-a-Service) applications, websites, and other digital resources with a single set of login…

View Article
Datacenter networking servers

The Ultimate Guide to Web Application Firewalls (WAF)

Last Update: May 10, 2024

An often-overlooked element of security is the Web Application Firewall (WAF), especially in cloud computing. In this article, I explain what a WAF does, the different kinds of WAF, and I discuss why you should deploy one or more WAFs in your architecture. What is a Web Application Firewall (WAF)? A Web Application Firewall, often…

View Article
Nudge Security IT offboarding

The Dirty Truth About IT Offboarding Automation

Last Update: May 10, 2024

Every system administrator dreams of building the perfect Rube Goldberg machine of IT automation to manage the employee IT lifecycle, end to end, including IT offboarding. A new hire joins the company, HR files a ticket, and BAM! In an instant, all of the birthright accounts, access, and permissions are granted in a glorious cascade…

View Article
Security

Sponsored: Protecting your Domain and Users from Phishing Attacks

Last Update: May 10, 2024

Protecting your brand and your employees from phishing attacks is a critical first step to keeping your environment secure.

View Article
Security

Microsoft Introduces New Sentinel SOC Optimization Feature for Enhanced Cybersecurity

Microsoft announced yesterday a public preview of SOC optimization for Microsoft Sentinel customers. The feature provides actionable tailored recommendations, allowing organizations to pinpoint data utilization gaps and thwart various cyber threats. Microsoft emphasized the importance of security teams optimizing both processes and outcomes. They should consistently adjust their security controls to adapt to evolving threat…

View Article
Cloud Computing and Security

Microsoft Purview and Defender for Cloud Add New Security Features to Protect AI Applications

Microsoft has unveiled a host of new capabilities for its Microsoft Purview and Defender for Cloud solutions. The new features help IT administrators in efficiently managing, protecting, and governing AI applications within enterprise environments. First off, Microsoft has launched a new Purview AI Hub in public preview. This new service enables IT admins to gain…

View Article
Security

Microsoft Expands Secure Future Initiative to Counter Rising Cyber Threats

Microsoft has announced plans to make security its top priority to better protect its infrastructure and customers against sophisticated cyberattacks. The company has recently detailed in a blog post that it’s expanding the Secure Future Initiative (SFI) to ensure robust protection measures. Last year, Microsoft announced its Secure Future Initiative (SFI) to boost the built-in…

View Article
Cloud Computing and Security

Microsoft Introduces Trusted Signing Solution: Simplifying App Development for Developers

Microsoft has recently announced the public preview of its new Trusted Signing solution. This fully managed end-to-end signing service is designed to streamline processes, allowing developers to effortlessly build and distribute apps. “The service supports both public and private trust signing scenarios and includes a timestamping service. With Trusted Signing, users enjoy a productive, performant,…

View Article
Security hero image

Russian Hackers Exploit Critical Windows Vulnerability to Deploy ‘GooseEgg’ Malware

Microsoft has warned customers about the exploitation of a Windows print spooler vulnerability by Russian hackers, enabling them to elevate privileges and pilfer credentials within compromised enterprise networks. The Russian hacking group is using a custom tool known as GooseEgg to target a range of organizations. What is Windows Print Spooler vulnerability? Microsoft patched the…

View Article
Go to page