This Week in Technology

This Week in Technology

By Eric Corcoran
Posted in Technology Week in Review
On September 18, 2020

Monday 9/14

Apps in the Firing Line: The Enduring Power of DDoS Attacks (F5)

DDoS attacks have continued to evolve, grow teeth, and wreak havoc. This is particularly true in the wake of COVID-19, with a number of industry reports from the past two quarters highlighting significant spikes across the world.

When is the right time to upgrade your SQL Server? (Pure Storage)

The best way to go about your SQL Server upgrade is to coordinate the timing of it to include the full stack, from hardware to application. This method, often referred to as the net new or side-by-side method, is typically the easiest way to upgrade. It resolves many of the compatibility and upgrade issues that occur when upgrading to the most recent versions of hardware and software.

Tuesday 9/15

The new Citrix is here

We’re transforming our business to not only provide secure access to what people need from anywhere, but to enable organizations to deliver an employee experience that people need to do their very best work.

Nvidia To Acquire Arm In $40 Billion Chip Mega-Deal

By acquiring Arm, Nvidia would have the underlying technologies for the GPU, CPU and network in the data center and beyond, allowing the chipmaker to more tightly integrate those technologies and expanding upon what Nvidia has already started to do with its $8 billion acquisition of interconnect vendor Mellanox Technologies from earlier this year.

FBI says credential stuffing attacks are behind some recent bank hacks

Credential stuffing attacks also didn't target just user profiles, the FBI said, but they also targeted employee accounts, with the attackers aiming to access high-privileged accounts as well.

Wednesday 9/16

Rudeminer, Blacksquid and Lucifer Walk Into A Bar (Check Point)

What started as a miner with self-spreading capabilities that targeted the Windows system, has now evolved into a multi-platform and multi-architecture malware targeting Linux, and IoT devices as well.

QR Codes Serve Up a Menu of Security Concerns

QR codes are appealing targets for hackers because the mobile user interface prompts users to take immediate actions, while limiting the amount of information available. Meanwhile, mobile users are less vigilant than they are when using a laptop or desktop.

Thursday 9/17

Phishing Email Examples: How to Recognize a Phishing Email (McAfee)

Keeping your identity safe on the internet can be challenging. Phishing is a scam that tricks you into voluntarily providing important personal information. Protect yourself from phishing by reviewing some examples of phishing emails and learning more about this common online scam.

Check Point To Buy Secure Remote Access Startup Odo Security

Unlike traditional secure remote access tools, Check Point said Odo Security enables users to easily connect through a unified portal to a wide range of applications with no client or software installation. These applications can span the gamut from remote desktops and web applications to database servers and cloud and corporate servers, according to Check Point.

Friday 9/18

Bringing desktops as a service to Citrix Virtual Apps and Desktops

Because of the simplicity and flexibility that desktops as a service offers, we are evolving our Citrix Virtual Apps and Desktops family to help bring desktops-as-a-service options to all our customers.

New Vulnerabilities Bypass Multi-Factor Authentication for Microsoft 365 (Proofpoint)

These vulnerabilities could allow attackers to bypass MFA and access cloud applications that use the protocol, notably Microsoft 365. Due to the way Microsoft 365 session login is designed, an attacker could gain full access to the target’s account (including mail, files, contacts, data and more).

This ransomware has borrowed a sneaky trick for delivering malware to its victims

Much like many of the other 'human-led' ransomware gangs that use a combination of advanced hacking tools and human 'hands-on' techniques, Maze is able to continue trying different techniques until they succeed or the targeted organization identifies the seriousness of the threat and takes action to remediate it.