This Week in Technology

This Week in Technology

By Eric Corcoran
Posted in Technology Week in Review
On May 03, 2024

Monday 4/15

Understanding APIs and How Attackers Abuse Them to Steal Data (CyberArk)

While essential and prevalent, APIs are potential attack vectors when not properly protected via machine identity security best practices. They can be exploited to expose sensitive data (e.g., customer lists, personally identifiable information (PII) and credit card details) while enabling application-to-application communication.

https://www.cyberark.com/resources/blog/understanding-apis-and-how-attackers-abuse-them-to-steal-data

Wiz Acquires Gem Security to Reinvent Threat Detection in the Cloud (Wiz)

With the acquisition of Gem Security, Wiz is fueling our growth engine as we equip customers with a modern cloud security platform that meets all their needs, from CNAPP to CDR.

https://www.wiz.io/blog/wiz-acquires-gem-security-to-reinvent-threat-detection-in-the-cloud

Tuesday 4/16

What’s new with HDX in the 2402 LTSR (Citrix)

The good news is that Citrix Virtual Apps and Desktops 2402 LTSR is now available, and you can now take advantage of all the great features and enhancements made available over the last couple of years.

https://www.citrix.com/blogs/2024/04/15/whats-new-with-hdx-in-the-2402-ltsr/

Microsoft and Google Top the List in Q1 2024 Phishing Attacks: Check Point Research Highlights a Surge in Cyber Threats (Check Point)

During the first quarter of 2024, Microsoft continued to be the most imitated brand in phishing attacks, accounting for a staggering 38% of all brand phishing attempts. Google made a modest advance to the second spot, capturing 11% of attempted brand phishing attacks, up slightly from its previous third-place position.

https://blog.checkpoint.com/security/microsoft-and-google-top-the-list-in-q1-2024-phishing-attacks-check-point-research-highlights-a-surge-in-cyber-threats/

Wednesday 4/17

Taming the Storage Sprawl: Simplify Your Life with Fan-in Replication for Snapshot Consolidation (Pure Storage)

Data sprawl is a struggle storage admins know all too well. Learn how the magic of fan-in replication can make your life easier.

https://blog.purestorage.com/purely-technical/how-snapshot-consolidation-with-fan-in-replication-can-simplify-your-life/

3 Common IT Cost Optimization Mistakes and How to Resolve Them (Axonius)

Discovering cost inefficiencies is a simple way for teams to save money and shift unrealized spend to better use.

https://www.axonius.com/blog/three-common-it-security-cost-efficiencies-how-resolve-them

Thursday 4/18

The Evolving Threat of Ransomware — A Call to Action for Cybersecurity (Palo Alto Networks)

Once considered merely an IT issue, ransomware has since evolved into a pervasive threat, affecting individuals, businesses and governments alike. The sophistication of ransomware actors continues to grow, posing significant challenges for defenders.

https://www.paloaltonetworks.com/blog/2024/04/the-evolving-threat-of-ransomware/

Malvertising campaign targeting IT teams with MadMxShell (Zscaler)

The newly discovered backdoor uses several techniques such as multiple stages of DLL sideloading, abusing the DNS protocol for communicating with the command-and-control (C2) server, and evading memory forensics security solutions.

https://www.zscaler.com/blogs/security-research/malvertising-campaign-targeting-it-teams-madmxshell

Monday 4/22

Understanding APIs and How Attackers Abuse Them to Steal Data (CyberArk)

While essential and prevalent, APIs are potential attack vectors when not properly protected via machine identity security best practices. They can be exploited to expose sensitive data (e.g., customer lists, personally identifiable information (PII) and credit card details) while enabling application-to-application communication.

https://www.cyberark.com/resources/blog/understanding-apis-and-how-attackers-abuse-them-to-steal-data

CrowdStrike Extends Identity Security Capabilities to Stop Attacks in the Cloud (CrowdStrike)

While Microsoft Active Directory (AD) remains a prime target for attackers, cloud identity stores such as Microsoft Entra ID are also a target of opportunity. The reason is simple: Threat actors increasingly seek to mimic legitimate users in the target system.

https://www.crowdstrike.com/blog/identity-security-capabilities-stop-attacks-cloud/

Tuesday 4/23

Is Zero Trust Right for OT, Right Now? (Fortinet)

Although these connections can enhance production through data sharing and access to new cloud-based tools, this IT/OT convergence gives bad actors easier access to previously air-gapped OT environments, which exposes vulnerabilities and increases security and production risks.

https://www.fortinet.com/blog/business-and-technology/is-zero-trust-right-for-ot

Phishing: A Primer on How to Protect Your Organization (Arctic Wolf)

In April of 2024, the FBI released a warning that threat actors are sending SMS phishing, also known as smishing, messages to individuals pretending to be toll road operators messaging about unpaid toll fees. This kind of attack is a common one, and targets more than just individuals.

https://arcticwolf.com/resources/blog/phishing-a-primer-on-how-to-protect-your-organization/

Thursday 4/25

Key Findings from the 2024 Cloud Security Report (Fortinet)

Even though multi-cloud adoption has many benefits, dealing with multiple tools adds management complexity, making it difficult or impossible to apply consistent security policies across all cloud environments.

https://www.fortinet.com/blog/industry-trends/key-findings-cloud-security-report-2024

Phishing Attacks Rise 58% in the Year of AI: ThreatLabz 2024 Phishing Report (Zscaler)

Phishing threats have reached unprecedented levels of sophistication in the past year, driven by the proliferation of generative AI tools. Transforming how cybercriminals operate, AI advancements are revolutionizing and reshaping the phishing threat landscape.

https://www.zscaler.com/blogs/security-research/phishing-attacks-rise-58-year-ai-threatlabz-2024-phishing-report

Monday 4/29

Defense-in-Depth for Secrets Management: Discovery, Visibility, Leak Detection and AI (CyberArk)

With a defense-in-depth approach, AI and automation, security teams increasingly have opportunities to further address and improve the security of the organization’s machine identities and reduce cyber debt.

https://www.cyberark.com/resources/blog/defense-in-depth-for-secrets-management-discovery-visibility-leak-detection-and-ai

What Is PCI DSS And Why Is It Important? (Arctic Wolf)

While PCI DSS is not federal law, the major credit card companies do require compliance with their vendors, as well as anyone who stores, processes, or transmits cardholder data, and some states do have PCI DSS language written into their laws.

https://arcticwolf.com/resources/blog/what-is-pci-dss-and-why-is-it-important/

Tuesday 4/30

5 Best Practices to Secure AWS Resources (CrowdStrike)

As organizations migrate to the cloud, they face a complex and growing threat landscape of sophisticated and cloud-conscious threat actors. Organizations with ambitious digital transformation strategies must be prepared to address these security challenges from Day One.

https://www.crowdstrike.com/blog/best-practices-to-secure-aws-resources/

Key Findings from the 2024 Cloud Security Report (Fortinet)

Even though multi-cloud adoption has many benefits, dealing with multiple tools adds management complexity, making it difficult or impossible to apply consistent security policies across all cloud environments.

https://www.fortinet.com/blog/industry-trends/key-findings-cloud-security-report-2024

Wednesday 5/1

7 Essentials Every Data Security Posture Management (DSPM) Must Have (Check Point)

Sensitive data no longer lives in secure and centralized databases. Instead, it’s scattered in fluid and amorphic instances on various cloud and hybrid platforms, making data protection everyone’s problem.

https://blog.checkpoint.com/securing-the-cloud/7-essentials-every-data-security-posture-management-dspm-must-have/

Thursday 5/2

News about security vulnerabilities affecting Citrix NetScalers are a stark reminder of the evolving threat landscape. Our RemoteAdmin for ADC Managed Service solution specifically addresses the security vulnerabilities associated with NetScalers. Benefits include:

  • Proactive Patching
  • Effective Device Management
  • Cost-Effective Solutions

Visit the link below to learn more.

https://www.gothamtg.com//gotham-remoteadmin-for-adc

How Cloud Operating Models Are Transforming the Digital Enterprise (Pure Storage)

The cloud was once thought of as the way to go for everything, but it comes with challenges. See the smarter way to think about cloud resources and the benefits it can offer your organization.

https://blog.purestorage.com/perspectives/how-cloud-operating-models-are-transforming-the-digital-enterprise/

Cybersecurity Platformization (Palo Alto Networks)

Now, as we enter the age of AI in cybersecurity, centralized high-quality data will take an important role to drive high levels of attack protection and a reduction in MTTR (mean time to respond). Given these imminent trends, how can organizations navigate this seeming contradiction between an integrated platform approach and best-of-breed tools?

https://www.paloaltonetworks.com/blog/2024/04/cybersecurity-platformization/

Friday 5/3

In support of Earth Month, Gotham employees and the Gotham Charitable Foundation raised over $1,000 for charity: water, a global nonprofit organization whose goal is to bring clean and safe water to every person on the planet. This month, Gotham will raise funds for The Seeing Eye.

Click the link below to learn more about charity: water.

https://www.charitywater.org/

Best Practices to Strengthen VPN Security (HYPR)

Despite the security concerns, VPNs are not going away any time soon. Adhering to VPN security best practices mitigates the technology’s vulnerabilities to safeguard your employees, systems and data.

https://blog.hypr.com/vpn-security-best-practices

Azure Stack HCI & Azure Virtual Desktop: What It Is, Benefits, Use Cases, And More (Nerdio)

You can use Azure Stack HCI to support diverse workloads, including AVD, backup and disaster recovery, databases, big data analytics, Kubernetes, and edge computing. Many organizations utilize it to retain certain data and workloads on-premises, ensuring compliance, security, and performance requirements are met.

https://getnerdio.com/resources/azure-stack-hci-avd/