Articles by 'Eric Corcoran'

Blog Author - Eric Corcoran

By Eric Corcoran, Posted in Technology Week in Review

Monday 11/27 Business Email Compromise Attacks (BEC) Keep Growing — Here’s How to Increase Your BEC Cybersecurity (Arctic Wolf) It’s clear that Business Email Compromise (BEC) is quickly becoming a top tactic for threat actors, and they have become increasingly adept at not only spoofing email addresses but taking over accounts altogether once they are compromised — all with the goal of tricking users and stealing funds. https://arcticwolf.com/resources/blog/business-email-comprom... read more.

  • December 01, 2023

By Eric Corcoran, Posted in Technology Week in Review

Monday 11/13 Identity Security’s Crucial Role in Safeguarding Data Privacy (CyberArk) In today’s digital age, data is the lifeblood of businesses and organizations, fueling decision-making, innovation and customer trust. And the benefits of being an effective data steward are often rooted in outcomes that don’t happen. https://bit.ly/3SG5vGg New Gartner® BEC Report: Recommendations Are Fully Supported by Proofpoint (Proofpoint) The rate of BEC attacks and the average loss per inci... read more.

  • November 17, 2023

By Eric Corcoran, Posted in Technology Week in Review

Monday 11/6   Purity//FA 6.6.0: Paving the Way for FlashArray//E (Pure Storage) Purity//FA 6.6.0 delivers bold ESG benefits, enables storage consolidation, and simplifies storage provisioning along with other improvements for FlashArray customers. https://bit.ly/49gnOrc How to Secure Your Network Infrastructure (Arctic Wolf) Effective security operations are necessary to continuously monitor data centers and servers, user login activity, SaaS applications, cloud workloads, email systems, and mana... read more.

  • November 10, 2023

By Eric Corcoran, Posted in Technology Week in Review

Monday 10/30 ICYMI: Gotham’s CTO, Ken Phelan, met with Secure Network Technologies’ President, Steve Stasiukonis, to discuss the steps you need to take during a cybersecurity event. See the link below for the full video. https://youtu.be/u6J7BV5cImQ Skeleton Keys and Local Admin Passwords: A Cautionary Tale (CyberArk) In today’s complex enterprise landscape, the prevalent use of what can be termed as “modern digital skeleton keys” – local administrator accounts &ndas... read more.

  • November 03, 2023

By Eric Corcoran, Posted in Technology Week in Review

Monday 10/23 Another InfoStealer Enters the Field, ExelaStealer (Fortinet) InfoStealer malware exfiltrates data belonging to corporations and individuals that can be used for blackmail, espionage, or ransom. Despite the number of infostealers in the wild, ExelaStealer shows there is still room for new players to emerge and gain traction. https://bit.ly/3s28AFw Are You Sure Your Browser is Up to Date? The Current Landscape of Fake Browser Updates (Proofpoint) Fake browser updates refer to compromised we... read more.

  • October 27, 2023

By Eric Corcoran, Posted in Technology Week in Review

Monday 10/16 I’ve Been Hit by Ransomware—Now What? Steps for Dealing with the Aftermath (Proofpoint) The best ransomware strategy is to avoid it in the first place. But increasingly advanced attacks against the software supply chain and end users have shown that even the best-prepared companies can be caught out. https://bit.ly/45yOyju PAM and Cloud Security: The Case for Zero Standing Privileges (CyberArk) A new approach is required to apply the principles of Zero Trust in a world with the... read more.

  • October 20, 2023

By Eric Corcoran, Posted in Technology Week in Review

Monday 10/2 Join Gotham CTO, Ken Phelan, and Secure Networks Technologies President, Steve Stasiukonis, on Thursday, October 26, at 9:30 AM for a CTO Tech Talk discussing what you need to do during a cybersecurity event. See the link below for registration details. https://www.eventbrite.com/e/cto-tech-talk-tickets-723656886227?aff=oddtdtcreator Driving Enterprise Hybrid Cloud Efficiency: How F5 and NetApp Change the Game (F5) With data stored across multiple cloud environments and on-premises, the nee... read more.

  • October 13, 2023

By Eric Corcoran, Posted in Technology Week in Review

Monday 9/25 10 Real-World Business Email Compromise (BEC) Scam Examples (Proofpoint) The FBI’s Internet Crime Complaint Center reports that businesses lost more than $2.7 billion to BEC scams in 2022. That’s more than one-quarter of all the cyber crime-related financial losses for that year. https://bit.ly/3RC1LVw What is Alert Deafness? (Check Point) The exponential increase in data processed by organizations means a rise in errors, failures, and vulnerabilities is expected. But with pings... read more.

  • September 29, 2023

By Eric Corcoran, Posted in Technology Week in Review

Monday 9/18 August 2023’s Most Wanted Malware: New ChromeLoader Campaign Spreads Malicious Browser Extensions while QBot is Shut Down by FBI (Check Point) Check Point Research reported on a new ChromeLoader campaign named “Shampoo” which targets Chrome browser users with malware-loaded fake ads. Meanwhile, the communications sector jumped up the list to the second most impacted industry over healthcare. https://bit.ly/3EKqbV6 5 Password Cracking Techniques Used in Cyber Attacks (Proofp... read more.

  • September 22, 2023

By Eric Corcoran, Posted in Technology Week in Review

Monday 9/11 New Perimeters—Identity Threats Are the New Attack Surface (Proofpoint) Cyber criminals can bypass standard perimeter defenses with minimal effort or technical know-how by targeting unmanaged and misconfigured identities. Service accounts, local and shadow admins and cached credentials often slip through the net of privilege and password security tools. https://bit.ly/488aQeF Purity//FA 6.4.10: NFS 4.1 Support and Ransomware Protection Enhancements (Pure Storage) The latest release of... read more.

  • September 15, 2023