Are you listening to your logs? Part 3: High disk usage

In the previous blog of this series, we saw how server crashes can be avoided by detecting low disk space in time using logs. In this blog, we’ll talk about another server... Read more »

New Phishing Attack Targets 200M+ Microsoft 365 Accounts Via Malicious Excel .SLK Files to Bypass Security

Using an old (but supported) Excel filetype, attackers can bypass both Exchange Online Protection and Advanced Threat Protection to run malicious macros. Security researchers at Avanan have discovered a new attack method... Read more »

Optrics Insider – FBI Warns About Malicious Banking Apps, Internet of Troubles, IBM Cloud Down & Malware at Honda Apps

 Join Scott Young and Shaun Sturby from Optrics Engineering as they discuss the FBI’s warning about malicious banking apps, the “Internet of Troubles”, IBM’s cloud being down for 2 hours plus... Read more »

Fake Zoom Downloader is the Latest Method of Attack on Remote Workers

Riding on the coattails of the massive rise in popularity in the video conference solution, remote workers new to Zoom need to be wary of where they download the installer. We’ve written... Read more »