Month: August 2022

Simple Guide to Infrastructure as Service

Take a load off your shoulders with IaaS. If you’ve ever tried supplying or accessing a physical server and a virtual server, you’ll know how easy it is to work with virtual servers. Providing even a single physical server can pile on huge costs and requires space to house. Once you start dealing with several network components and […]

Common Network Threats and How to Prevent

Cybercriminals can employ many methods to harm you. These malicious actors can use network security threats to exploit your network’s attack vectors or vulnerabilities. Networking threats come in different forms, but they all target a similar end goal: accessing your system to steal your data.  To protect yourself against cyberattacks, you must learn the possible threats to your network and how you can protect […]

Top Risk Management Software

Risks are inherent to every business. Though it’s impossible to completely avoid risks in any business area, such as operations, security, etc., you can take preventive measures to reduce their occurrence. This is where risk management software can help. Risk management is a process that proactively identifies risks and evaluates their probability. Consequently, it helps your organization prioritize resources and take […]

Top 5 Network Security Tools

Network security is essential to creating trustworthy networks and protecting your firm from cyberattacks. It often involves a set of security rules, configurations, and processes that use many hardware and software tools. The link below discuss some of the top software-based network security tools available today. I’ll also describe how they help boost your company’s security and trustworthiness. 

Difference in Network Observability and Monitoring

Cloud computing has made our networks complex to the point that we need better resources to watch over them. Network observability and monitoring are two resources you can use to achieve that. Of course, they have unique use-cases, but can you use them together? Read more to find what network observability and monitoring are and their different use-cases; […]

Single vs Multi Tenant Cloud Architecture

Using the cloud in your business is undoubtedly beneficial for infrastructure, security, marketing, and deployment. Depending on your business needs, you’ll have to choose whether to use single-tenant or multi-tenant cloud architecture.  Single-tenant architecture is when a single client uses a dedicated cloud server. Conversely, multi-tenant cloud architecture is meant for multiple clients, all of whom share the same server segment. Generally, […]

Windows Powershell Tips and Tutorial

This week we have nine tips for those who use PowerShell for managing their environment: Configuring PowerShell 7 With Group Policy (Under The Stairs) 3 Ways to Download a File in PowerShell (ITPro Today) How to perform Azure AD bulk operations with PowerShell (Command Line Ninja) From Standard User To Elevated Administrator: Run Elevated Powershell […]

New Iranian APT Data Extraction Tool: HYPERSCRAPE

In December 2021, TAG discovered a novel APT35 (Charming Kitten) tool, named HYPERSCRAPE, used to steal user data from Gmail, Yahoo!, and Microsoft Outlook accounts. The attacker runs HYPERSCRAPE on their own machine to download victims’ inboxes using previously acquired credentials. Google has seen the tool deployed against fewer than two dozen accounts located in […]

HavanaCrypt Ransomware Masquarading as Google Update

First observed June 2022 in the wild, HavanaCrypt Ransomware masquerades as a legitimate Google Chrome update with sophisticated anti-analysis techniques and other functionality that may be used for data exfiltration and privilege escalation since its lack of a ransom note renders it unprofitable for its author. HavanaCrypt leverages functionalities from the open-source password software KeePass […]

Log4j2 Vulnerability exploited to Target Israeli Organization

MERCURY Leveraging Log4j 2 Vulnerabilities in Unpatched Systems to Target Israeli Organizations On July 23 and 25, 2022, MERCURY was observed using exploits against vulnerable SysAid Server instances as its initial access vector. Based on observations from past campaigns and vulnerabilities found in the targets’ environment, Microsoft assess that the exploits used were most likely related to […]

UTM is there a need ?

What Is Unified Threat Management and Why Is It Important for Cybersecurity? Cyberattacks are on the rise, and falling victim to one can result in detrimental consequences, including financial and reputational losses. You need the right defenses in place to better protect yourself, your company, and, more importantly, your clients! Don’t worry, several solutions are at […]

Defending against Computer Worms

What Are Computer Worms and What Are the Best Tools to Defend Your Network against Them? A computer worm is a malicious program that distributes itself across a computer network. Like biological systems, computer systems are also plagued by various maladies known as malware. Malware is an all-encompassing term that refers to malicious, hostile, and invasive programs aiming to harm computer systems or networks. […]

Tech Tips and Tutorials

Here’s a handful of cybersecurity best practices and tips for you: How to Protect Your System from a Side-Channel Attack (TechGenix) NSA shares tips on securing Windows devices with PowerShell(BleepingComputer) Cloud Security Pen Testing: Everything You Need to Know (Charbel Nemnom) Securing Virtual Machine Infrastructure in Microsoft Azure (Marius Sandbu) Video: Practical Aspects of IPv6 Security (ipSpace.net)

Linux News

Something to think about for those considering migrating PCs from Windows to Linux. Major Linux Problems on the Desktop, 2022 edition (ITVision). This guy also has interesting articles about everything wrong with Win10 and Win11. Very opinionated but has lots of stuff to think about.

Windows News

Good news, you can finally purchase Windows 11 Home and Professional licenses directly from Microsoft instead of having to buy Windows 10 first and then do an upgrade (Tom’s Hardware). Bad news, more USB printing problems with Windows 10 (Born’s Tech and Windows World). Good news, it’s now easier to rip CDs using Media Player in Windows 11(BetaNews). If you […]

SocGHolish: 5+ Years of Massive Website Infection

SocGholish: 5+ Years of Massive Website Infections SocGholish is a JavaScript malware framework that has been in use since at least 2017. It is distributed through a number of malicious sites claiming to provide critical browser updates. In reality, these sites are designed to trick victims into downloading and installing malware — usually in the […]

PyPl Package Drops Fileless Linux Malware

PyPI Package ‘secretslib’ Drops Fileless Linux Malware to Mine Monero Sonatype has identified a ‘secretslib’ PyPI package that describes itself as “secrets matching and verification made easy.” On a closer inspection though, the package covertly runs cryptominers on your Linux machine in-memory (directly from your RAM), a technique largely employed by fileless malware and crypters.  […]

Windows 11 Tech tips

Rufus – How it modifies Media – Out of Officehttps://oofhours.com/2022/07/25/rufus-isnt-magic-how-it-modifies-windows-11-media/ Install Windows 11 without Windows account – Tomshardwarehttps://www.tomshardware.com/how-to/install-windows-11-without-microsoft-account How to clean boot Windows 11 -Techrepublichttps://www.techrepublic.com/article/clean-boot-windows/ Customizing the Windows 11 22H2 Start menu layout – Out of Officehttps://oofhours.com/2022/04/27/customizing-the-windows-11-22h2-start-menu-layout/

Malware that runs automatically and hides on Google Play

McAfee’s Mobile Research Team has identified new malware on the Google Play Store. Most of them are disguising themselves as cleaner apps that delete junk files or help optimize their batteries for device management. However, this malware hides and continuously show advertisements to victims. In addition, they run malicious services automatically upon installation without executing […]

Scroll to top