Conquer it with correlation: Cryptojacking
Your company’s data is not the only valuable thing it has to offer to hackers looking for a payday. Organizational networks around the world have something much more basic which hackers can go after: sheer computing power. Cryptojacking, the unauthorized use of computing resources to mine cryptocurrency, exploits this power. While this type of attack… (0 comment)

Microsoft Patch Tuesday updates for December 2018
Another month and another Patch Tuesday update from Microsoft. But this month, the buzz is all about a third-party patch from Adobe that addresses a zero-day vulnerability. This vulnerability (CVE-2018-15982) is rated critical since it’s being actively exploited in the wild. It’s said that this vulnerability allows a maliciously crafted Flash object to execute code… (0 comment)

Account lockout and management tools
Sometimes, when you get a call regarding a password reset, you can already guess who it’s from. Most organizations have one—that one employee who somehow manages to forget their password and gets locked out of their account more than everyone else. So you reset this forgetful user’s password, and sure enough, five minutes later they… (0 comment)