This Week in Technology

This Week in Technology

By Eric Corcoran
Posted in Technology Week in Review
On September 22, 2023

Monday 9/18

August 2023’s Most Wanted Malware: New ChromeLoader Campaign Spreads Malicious Browser Extensions while QBot is Shut Down by FBI (Check Point)

Check Point Research reported on a new ChromeLoader campaign named “Shampoo” which targets Chrome browser users with malware-loaded fake ads. Meanwhile, the communications sector jumped up the list to the second most impacted industry over healthcare.

https://bit.ly/3EKqbV6

5 Password Cracking Techniques Used in Cyber Attacks (Proofpoint)

Password cracking typically refers to the process of recovering scrambled passwords. It can be used to help a user get back a forgotten password or to help a system administrator check for weak passwords. But more often, password cracking is used by bad actors to gain unauthorized access to systems and resources.

https://bit.ly/3LrPUp3

Tuesday 9/19

It’s An Older Code Sir, But It Checks Out ft. Bryon Singh, RailWorks Corporation

https://www.gothamtg.com/blog/its-an-older-code-sir-but-it-checks-out

Why Legacy AV Is an Easy Target for Attackers (CrowdStrike)

Legacy antivirus software is no match for today’s adversaries. Modern endpoint security keeps you ahead of evolving threats.

https://bit.ly/3PJty55

Wednesday 9/20

2023 Unit 42 Attack Surface Threat Report Highlights the Need for ASM (Palo Alto Networks)

Palo Alto Networks Unit 42 illuminates some of the riskiest security observations around attack surface management (ASM) with the 2023 Unit 42 Attack Surface Threat Report. The report contrasts the dynamic nature of cloud environments with the speed at which threat actors are exploiting new vulnerabilities.

https://bit.ly/3RtjbUr

Why Aren't You Using VMware vSphere Content Libraries?

For those entrenched in virtualization, vSphere's Content Libraries are no stranger. Despite their glaring advantages, the adoption rate has been sluggishly low, primarily because of traditionalist tendencies.

https://www.gothamtg.com/blog/why-arent-you-using-vmware-vsphere-content-libraries

The Three Rs of Data Storage: Resiliency, Redundancy, and Rebuilds (Pure Storage)

Everyone cares about the durability of their data. The good news is that Pure Storage has made this a non-issue for our customers because of how we design our systems.

https://bit.ly/3RtoWRT

Thursday 9/21

Cisco acquiring cybersecurity company Splunk in cash deal worth $28 billion

Splunk is a cybersecurity company that helps enterprises monitor and analyze their data to minimize the risk of hacks and resolve technical issues faster.

https://bit.ly/44ZYiDk

Five Areas Where Improved API Protection Amplifies Security in Financial Services (F5)

Business-critical APIs are targeted constantly by attackers, who realize that they stand to profit or otherwise benefit from exploiting, abusing, and/or compromising APIs. At the same time, the attack surface has broadened significantly in recent years.

https://bit.ly/3ZnGD7r

Friday 9/22

Securing Workforce Access with Greater Visibility, Integration and Automation (CyberArk)

While various analytics tools have been in market for a while, enterprise security teams need capabilities beyond simple feeds and dashboards. Today’s threats call for a sophisticated user behavior analytics (UBA) engine serving as a centralized brain and nervous system – all-seeing, all-knowing.

https://bit.ly/3ZpY1II

Ransomware Roundup - Retch and S.H.O. (Fortinet)

The Ransomware Roundup report aims to provide readers with brief insights into the evolving ransomware landscape and the Fortinet solutions that protect against those variants.

https://bit.ly/3PQZIMd