Monday 9/16
F5 Networks: Application Lifecycle Focus Is Giving Partners A 'Bigger Piece Of The Pie’
Customers are constantly cycling through developing, deploying, operating and governing code, often across multiple cloud environments. It's a difficult process and the vast majority of customers doing it fast and at scale need help, said F5 Networks President and CEO François Locoh-Donou.
http://bit.ly/2lST2l0
Mobile Security Flaw Leaves Android Smartphones Vulnerable to SMS Phishing Attacks
The vulnerability relies on a process called over-the-air (OTA) provisioning, which is normally used by cellular network operators to deploy network-specific settings to a new phone joining their network.
http://bit.ly/2lPXcKD
Tuesday 9/17
The Rise of New Tactics in Business Email Compromise
Impersonation attacks, CEO fraud and business email compromise (BEC), showed a steady increase in Q1 2019 and are projected to rise through Q2 2019. Cyber criminals impersonate executives, senior managers and supply chain partners to dupe employees into taking action by authorizing fraudulent wire transfers or providing confidential information.
http://bit.ly/2mm2I7W
Wednesday 9/18
Pure Storage launches AI Data Hub, builds out AI workflow effort
Pure Storage launched a bevy of artificial intelligence tools, including the AI Data Hub, which are designed to meld storage and AI workflows from design to deployment.
https://zd.net/2kSGJoz
IGEL Featured in 2019 CRN Cloud Partner Program Guide
IGEL’s next-gen edge OS is the perfect onboarding solution for today’s leading cloud workspace platforms from Amazon, Citrix, Microsoft and VMware.
http://bit.ly/2moVFLT
Emotet is back after a summer break
At the beginning of June 2019, Emotet's operators decided to take an extended summer vacation. Even the command and control (C2) activities saw a major pause in activity. However, as summer begins drawing to a close, Talos and other researchers started to see increased activity in Emotet's C2 infrastructure.
http://bit.ly/2lVyBE6
Thursday 9/19
Pure’s Modern Data Experience: Transforming the Customer Approach to IT
As the only data storage vendor to offer all of its core products as a service today, Pure delivers the Modern Data Experience -- simple, seamless and sustainable.
http://bit.ly/2klgwPg
Magecart Skimming Attack Targets Mobile Users of Hotel Chain Booking Websites
We discovered a series of incidents where the credit card skimming attack Magecart was used to hit the booking websites of chain-brand hotels — the second time we’ve seen a Magecart threat actor directly hit ecommerce service providers instead of going for individual stores or third-party supply chains.
http://bit.ly/2kUAdh5
Friday 9/20
What’s new with Citrix Virtual Apps and Desktops: September 2019
As usual, we’ve got some amazing new updates coming for our Citrix Virtual Apps and Desktops customers. But most importantly, we have some exciting news for customers who are waiting for updates about our next Long-Term Service Release.
http://bit.ly/2m6Orf1
August 2019’s Most Wanted Malware: Echobot Launches Widespread Attack Against IoT Devices
The Research team is warning organizations of a new variant of the Mirai IoT Botnet, Echobot, which has launched widespread attacks against a range of IoT devices.
http://bit.ly/2kL14MO