In the previous blog of this series, we saw how server crashes can be avoided by detecting low disk space in time using logs. In this blog, we’ll talk about another server... Read more »
Using an old (but supported) Excel filetype, attackers can bypass both Exchange Online Protection and Advanced Threat Protection to run malicious macros. Security researchers at Avanan have discovered a new attack method... Read more »
Join Scott Young and Shaun Sturby from Optrics Engineering as they discuss the FBI’s warning about malicious banking apps, the “Internet of Troubles”, IBM’s cloud being down for 2 hours plus... Read more »
Riding on the coattails of the massive rise in popularity in the video conference solution, remote workers new to Zoom need to be wary of where they download the installer. We’ve written... Read more »