Conquer it with correlation: Cryptojacking
Your company’s data is not the only valuable thing it has to offer to hackers looking for a payday. Organizational networks around the world have something much more basic which hackers can go after: sheer computing power. Cryptojacking, the unauthorized use of computing resources to mine cryptocurrency, exploits this power. While this type of attack… (0 comment)

Tackling IP address management challenges using OpUtils
If you’re a network administrator, then you probably already know that complex spreadsheets and home-grown solutions for IP address management (IPAM) just don’t cut it anymore. You need a solution that provides comprehensive IPAM, DHCP management, and DNS monitoring to prevent IP address conflicts and ARP spoofing attacks. Overlooking the importance of gaining control over… (0 comment)

Microsoft Patch Tuesday updates for December 2018
Another month and another Patch Tuesday update from Microsoft. But this month, the buzz is all about a third-party patch from Adobe that addresses a zero-day vulnerability. This vulnerability (CVE-2018-15982) is rated critical since it’s being actively exploited in the wild. It’s said that this vulnerability allows a maliciously crafted Flash object to execute code… (0 comment)