Author: Shannon Lewis

Say hello to Windows 11 with Endpoint Central

By Manish MandalMicrosoft unveiled Windows 11 on June 24, 2021 at its virtual launch event. Though Windows 11 will be officially available on October 5, 2021, Microsoft has shared the initial beta version with members of its Windows Insider Program. Starting October 5th, Microsoft will roll out the Windows 11 upgrade to eligible Windows 10 […]

Google Ads Abused to Deliver Malware

Cybercriminals are using malicious Google Ads to deliver the ZLoader banking Trojan, ZDNet reports. Researchers at Microsoft stated on Twitter that attackers are purchasing Google Ads that point to compromised websites, then redirect the user to a malicious website that delivers the malware. The criminals use the ads to target people who search Google for […]

A kernel of truth: Linux isn’t as foolproof as we may have thought

By Joyal BennisonA world without Linux is hard to imagine. Every Google search we run is accomplished on Linux-based servers. Behind the Kindle we enjoy reading, to the social media sites we spend scrolling away every day sits the Linux kernel. Would you believe your ears if I tell you the world’s top 500 supercomputers […]

Five worthy reads: Differential privacy—what it means for businesses

Five worthy reads is a regular column on five noteworthy items we’ve discovered while researching trending and timeless topics. In this edition, we explore one of the evolving privacy-enhancing techniques called differential privacy and how it’s being leveraged by organizations to safeguard sensitive data from being exposed.By Abirami ACutting-edge technologies based on artificial intelligence and […]

Large Phishing Campaign Abuses Open Redirects

Researchers at Microsoft have observed a widespread phishing campaign that’s abusing open redirectors to fool users into visiting credential-harvesting pages. Open redirects are often used for legitimate purposes, such as tracking click rates. However, they can also be abused to disguise a link to a phishing page.“The use of open redirects in email communications is […]

Securing endpoints, part 1: Ensuring hackers don’t manipulate your browsers to carry out attacks

By Bhuvaneswari KgIn a world of automation, computers and the data on them have become the backbone of many organizations. But data is a double-edged sword. It can be leveraged by organizations to improve operations, but in the wrong hands, it can be a deadly weapon for hackers. So how do organizations ensure their data […]

44 vulnerabilities, including 3 zero-days, fixed in August 2021 Patch Tuesday

By Karthika SurendranAfter last month’s PrintNightmare vulnerability, system admins are only just catching their breaths, but this month’s Patch Tuesday is already here, so it’s back to hustling for IT teams. With most organizations embracing a distributed workforce, system administrators are bound to be up to their ears in work for the next two weeks, […]

Optrics Insider – DeepFake Lite, Microsoft Print Nightmare & Kaseya Update

Join Scott Young and Shaun Sturby from Optrics Engineering as they discuss DeepFake Lite using Anthony Bourdain’s voice in a new documentary on his life, the “Summer of Sam” Microsoft Print Nightmare and the latest Kaseya Ransomware Attack update.Timecodes:0:00 – Intro0:19 – Today’s 3 topics0:33 – Topic 1: Deep Fake Lite7:35 – Topic 2: Microsoft […]

Android Trojan Goes After Facebook Accounts

A new Android Trojan has hijacked more than 10,000 Facebook accounts by stealing session cookies, according to researchers at Zimperium. The malware uses social engineering to trick users into installing malicious apps from the Google Play Store and third-party app stores.“The threat actors made use of several themes that users would find appealing such as […]

Why implementing Zero Trust is more important than ever before

By Sree RamFive worthy reads is a regular column on five noteworthy items we’ve discovered while researching trending and timeless topics. This week, we explore why organizations should implement Zero Trust in 2021.In 2010, John Kindervag introduced the concept of “Zero Trust” which has become a touchstone for cyber resilience and persistent security. Zero Trust […]