Moving OneNote Notebooks
Microsoft OneNote is a popular program for taking and sharing notes. One challenge with OneNote though is moving or migrating notebooks. This challenge has become amplified because Microsoft has changed the options available for moving notebooks through the various flavors and versions of OneNote over the years. There is also confusing documentation on how to move notebooks. Hopefully this blog will provide some clarity.
When it Comes to OT, if You’re Standing Still, You’re Falling Behind (Fortinet)
With the rise of cyberattacks on critical infrastructure and the proliferation of connected industrial devices, OT security is more important than ever.
Security Brief: TA866 Returns with a Large Email Campaign (Proofpoint)
Proofpoint researchers identified the return of TA866 to email threat campaign data, after a nine-month absence. On January 11, 2024, Proofpoint blocked a large volume campaign consisting of several thousand emails targeting North America.
Cause and Effect ft. Bryon Singh, RailWorks Corporation
How to Use Context-Based Authentication to Improve Security
One of the biggest security weak points for organizations involves their authentication processes. According to Google Cloud’s 2023 Threat Horizons Report, 86% of breaches involve stolen credentials.
Gotham Technology Group is the @Lakeside Software Americas Regional Partner of the Year for 2024! It’s an honor to be recognized for the outstanding achievements that fueled innovation and growth. We’re proud to be a leading Lakeside partner and are committed to continuing to deliver meaningful outcomes to our shared customers. #LakesidePartner
Conditional QR Code Routing Attacks (Check Point)
Over the summer, we saw a somewhat unexpected rise in QR-code based phishing -attacks. These attacks were all fairly similar. The main goal was to induce the end-user to scan the QR Code, where they would be redirected to a credential harvesting page.
CherryLoader: A New Go-based Loader Discovered in Recent Intrusions (Arctic Wolf)
Arctic Wolf Labs has been tracking two recent intrusions where threat actors leveraged a new Go-based malware downloader we are calling “CherryLoader” that allowed them to swap exploits without recompiling code.
Gotham is looking to fill some great positions in New York and Connecticut in this week's top jobs. Visit our jobs page by clicking the link below to discover more open positions.
Why Identity Security Requires More Than ITDR (CyberArk)
Identity Threat Detection and Response (ITDR) is one of many aspects of an effective identity security program. Yet despite what some detection and response-focused vendors may argue, ITDR is not a silver-bullet solution to prevent identity-centric attacks. Such a thing doesn’t exist.
Making your Citrix Profile Management share highly available (Citrix)
When deploying a Citrix environment, customers often ask about the best way to provide high availability (HA) for their profiles. This blog post will discuss the most common options with their pros & cons so you can make this critical portion of your environment more resilient.
Earlier this week, Gotham Technology Group was named @Lakeside Software’s Americas Regional Partner of the Year for 2024! It’s an honor to be recognized for the outstanding achievements that fueled innovation and growth. We’re proud to be a leading Lakeside partner and are committed to continuing to deliver meaningful outcomes to our shared customers. #LakesidePartner
Click the link below for our full press release.
Cloud Workloads: Cybersecurity Predictions for 2024 (Zscaler)
The year 2023 witnessed explosive transitions in the cloud security market, with every aspect of the ecosystem—vendors, products, and infrastructure—undergoing significant change. Looking ahead to 2024, cybersecurity for workloads (VMs, containers, services) in the public cloud will continue to evolve as customers continue to strike a balance between aggressive cloud adoption and compliance with corporate security needs.