Articles In Technology Week in Review

By Eric Corcoran, Posted in Technology Week in Review

Monday 2/19 The State of Security in 2024: The Bad Guys Love AI Too (Pure Storage) AI is allowing the bad guys to scale their attack campaigns. AI is also opening the door for newbie attackers who need little knowledge of coding to launch effective campaigns. Here’s what’s happening right now in security, and why these trends will likely dominate the rest of this year. https://blog.purestorage.com/perspectives/10-security-trends-and-predictions/ The Ins and Outs of Data Privacy, Part 1: The... read more.

  • March 01, 2024

By Eric Corcoran, Posted in Technology Week in Review

Monday 2/12 CrowdStrike Defends Against Azure Cross-Tenant Synchronization Attacks (CrowdStrike) As Microsoft Azure continues to gain market share in the cloud infrastructure space, it has garnered attention from adversaries ranging from hacktivist and eCrime threat actors to nation-state adversaries. Recent attacks on Microsoft by cloud-focused threat actors like COZY BEAR are becoming more frequent and garnering huge attention. https://www.crowdstrike.com/blog/crowdstrike-defends-against-azure-cross-te... read more.

  • February 16, 2024

By Eric Corcoran, Posted in Technology Week in Review

Monday 2/5 ICYMI: Gotham CTO Ken Phelan and Nutanix Senior Vice President of Solution Sales Mike Phelan met to discuss the cost effectiveness of hybrid cloud solutions as cloud providers encourage users to "go native." Click the link below for the full video. https://www.youtube.com/watch?v=vL2My98ISek Tuesday 2/6 Zero Days ft. Bryon Singh, RailWorks Corporation https://www.gothamtg.com/blog/zero-days Architecture Drift: What It Is and How It Leads to Breaches (CrowdStrike) Each time a digital ecosy... read more.

  • February 09, 2024

By Eric Corcoran, Posted in Technology Week in Review

Monday 1/29 Evergreen//One Recognized as DCIG TOP 5 Storage as-a-Service Solution (Pure Storage) The Data Center Intelligence Group (DCIG) recently recognized Evergreen//One™ from Pure Storage as a DCIG TOP 5 solution in the 2022-23 DCIG TOP 5 Enterprise Storage as a Service Solutions report. https://blog.purestorage.com/products/evergreen-one-recognized-as-dcig-top-5-storage-as-a-service-solution/ 5 Common Privilege Escalation Attack Techniques with Examples (Proofpoint) Privilege escalation is... read more.

  • February 02, 2024

By Eric Corcoran, Posted in Technology Week in Review

Monday 1/22 Moving OneNote Notebooks Microsoft OneNote is a popular program for taking and sharing notes. One challenge with OneNote though is moving or migrating notebooks. This challenge has become amplified because Microsoft has changed the options available for moving notebooks through the various flavors and versions of OneNote over the years. There is also confusing documentation on how to move notebooks. Hopefully this blog will provide some clarity. https://www.gothamtg.com/blog/moving-onenote-no... read more.

  • January 26, 2024

By Eric Corcoran, Posted in Technology Week in Review

Monday 1/8 A Former Hacker Explains How to Fight Ransomware (Pure Storage) Cybercriminals are becoming increasingly bold these days, evolving their tactics and attacks as fast as we can evolve our defenses. What if, in the ongoing war against cybercrime, you could get intel on what they’re up to straight from a former hacker? Now you can. https://blog.purestorage.com/perspectives/a-former-hacker-explains-how-to-fight-ransomware/ Cybersecurity Stop of the Month: MFA Manipulation (Proofpoint) This... read more.

  • January 19, 2024

By Eric Corcoran, Posted in Technology Week in Review

Monday 12/11 Why Ransomware Actors Abuse Legitimate Software (CyberArk) Abusing organizations’ existing enterprise tools can help attackers blend in while they’re doing reconnaissance, and also aids them with privilege escalation and persistence. Coupling this technique with ransomware as a service (RaaS) also lowers the bar to entry by eliminating the need for attackers to create malware – something that requires skills, resources and time. https://www.cyberark.com/resources/blog/why-r... read more.

  • December 15, 2023

By Eric Corcoran, Posted in Technology Week in Review

Monday 12/4 Check Point Research Navigates Outlook’s Security Landscape: The Obvious, the Normal, and the Advanced (Check Point) Check Point Research (CPR) conducted a comprehensive analysis on ‘Outlook’, the desktop app in the Microsoft office suite, providing deeper insights into attack vectors, aiding both users and the security industry in understanding and mitigating potential risks. https://blog.checkpoint.com/security/check-point-research-navigates-outlooks-security-landscape-the... read more.

  • December 08, 2023

By Eric Corcoran, Posted in Technology Week in Review

Monday 11/27 Business Email Compromise Attacks (BEC) Keep Growing — Here’s How to Increase Your BEC Cybersecurity (Arctic Wolf) It’s clear that Business Email Compromise (BEC) is quickly becoming a top tactic for threat actors, and they have become increasingly adept at not only spoofing email addresses but taking over accounts altogether once they are compromised — all with the goal of tricking users and stealing funds. https://arcticwolf.com/resources/blog/business-email-comprom... read more.

  • December 01, 2023

By Eric Corcoran, Posted in Technology Week in Review

Monday 11/13 Identity Security’s Crucial Role in Safeguarding Data Privacy (CyberArk) In today’s digital age, data is the lifeblood of businesses and organizations, fueling decision-making, innovation and customer trust. And the benefits of being an effective data steward are often rooted in outcomes that don’t happen. https://bit.ly/3SG5vGg New Gartner® BEC Report: Recommendations Are Fully Supported by Proofpoint (Proofpoint) The rate of BEC attacks and the average loss per inci... read more.

  • November 17, 2023