Blog

By Steve Gold, Posted in Security

I’m not referring to the hit song from Lisa Lisa & Cult Jam, as this is a cybersecurity blog about CIS Controls. But now that the song is in my head, I may have to find a way to integrate it somehow. But I digress. I’m speaking of the infamous “WannaCry” ransomware attack that hit the world back in May 2017. WannaCry exploited vulnerabilities in older versions of Microsoft Windows to encrypt data on infected computers, demanding ransom payments in Bitcoin for decryption keys. Th... read more.

  • February 20, 2024

By Carlo Costanzo, Posted in Infrastructure, Virtualization

Recent developments from Broadcom regarding VMware's offerings have sparked significant discussions within our organization and our client base. As we dive deeper into these changes, I thought I would write this blog post to discuss two recent changes that I have been asked about and their potential impacts. The End of an Era: Discontinuation of ESXi Free With over a decade of availability, VMware has decided to discontinue the free version of its ESXi hypervisor (versions 7.x and 8.x), marking the end of... read more.

  • February 16, 2024

By Eric Corcoran, Posted in Technology Week in Review

Monday 2/12 CrowdStrike Defends Against Azure Cross-Tenant Synchronization Attacks (CrowdStrike) As Microsoft Azure continues to gain market share in the cloud infrastructure space, it has garnered attention from adversaries ranging from hacktivist and eCrime threat actors to nation-state adversaries. Recent attacks on Microsoft by cloud-focused threat actors like COZY BEAR are becoming more frequent and garnering huge attention. https://www.crowdstrike.com/blog/crowdstrike-defends-against-azure-cross-te... read more.

  • February 16, 2024

By Steve Gold, Posted in Security

This was the line said by Julius Levinson, played by Judd Hirsch in Independence Day, that changes the direction of the movie from potential annihilation to probable survival. David Levinson (Julian’s son), played by Jeff Goldblum is on the verge of giving up and accepting the fate that aliens will take over the planet. When he hears these words, he thinks about a cold, then a virus, and then a computer virus. David creates a computer virus (aka malware) that can infect alien ships, disable their def... read more.

  • February 13, 2024

By Eric Corcoran, Posted in Technology Week in Review

Monday 2/5 ICYMI: Gotham CTO Ken Phelan and Nutanix Senior Vice President of Solution Sales Mike Phelan met to discuss the cost effectiveness of hybrid cloud solutions as cloud providers encourage users to "go native." Click the link below for the full video. https://www.youtube.com/watch?v=vL2My98ISek Tuesday 2/6 Zero Days ft. Bryon Singh, RailWorks Corporation https://www.gothamtg.com/blog/zero-days Architecture Drift: What It Is and How It Leads to Breaches (CrowdStrike) Each time a digital ecosy... read more.

  • February 09, 2024

By Steve Gold, Posted in Security

The documentary "Zero Days" sheds light on the complexities of cybersecurity threats, such as the Stuxnet virus, which targeted industrial systems. The film exemplifies the sophisticated nature of modern cyberthreats and underscores the necessity of robust security measures like Domain Name System (DNS) filtering. The case of Stuxnet is a testament to the fact that no enterprise is immune to cyberthreats and proactive measures are essential. The Role of DNS Filtering in Enterprises: Blocking Access to Ma... read more.

  • February 06, 2024

By Eric Corcoran, Posted in Technology Week in Review

Monday 1/29 Evergreen//One Recognized as DCIG TOP 5 Storage as-a-Service Solution (Pure Storage) The Data Center Intelligence Group (DCIG) recently recognized Evergreen//One™ from Pure Storage as a DCIG TOP 5 solution in the 2022-23 DCIG TOP 5 Enterprise Storage as a Service Solutions report. https://blog.purestorage.com/products/evergreen-one-recognized-as-dcig-top-5-storage-as-a-service-solution/ 5 Common Privilege Escalation Attack Techniques with Examples (Proofpoint) Privilege escalation is... read more.

  • February 02, 2024

By Steve Gold, Posted in Security

I recently became a fan of “Black Mirror” and especially the above named episode. In this episode, the story revolves around a young man named Kenny who becomes the victim of a malicious hacker group. Kenny's life takes a dark turn when he is caught in a web of cybercrime after his computer is compromised and he is blackmailed through his browser and email client. Infection and Surveillance: Kenny's computer is infected with malware that allows the hacker group to monitor his online activiti... read more.

  • January 30, 2024

By Eric Corcoran, Posted in Technology Week in Review

Monday 1/22 Moving OneNote Notebooks Microsoft OneNote is a popular program for taking and sharing notes. One challenge with OneNote though is moving or migrating notebooks. This challenge has become amplified because Microsoft has changed the options available for moving notebooks through the various flavors and versions of OneNote over the years. There is also confusing documentation on how to move notebooks. Hopefully this blog will provide some clarity. https://www.gothamtg.com/blog/moving-onenote-no... read more.

  • January 26, 2024

By Steve Gold, Posted in Security

In Episode 18 of Season 5 of “Star Trek: The Next Generation,” the USS Enterprise becomes ensnared in a time loop, a phenomenon that causes the ship to repeatedly experience the same sequence of events. This time loop not only endangers the ship, but also poses a severe threat to the crew's safety and the ship's mission The character Data, played by Brent Spiner, is an android with a positronic brain that enables him to retain memories in ways that the rest of the crew cannot. As the time loop... read more.

  • January 23, 2024