This Week in Technology

This Week in Technology

By Eric Corcoran
Posted in Technology Week in Review
On January 08, 2021

Monday 1/4

Combatting BEC and EAC: How Security Awareness Can Help You Tackle Business Email Compromise (Proofpoint)

86% of organizations reported experiencing business email compromise, with most organizations reporting multiple attacks. These attacks are getting more sophisticated each year—so how can you prepare your users for the potential attack that slips by perimeter defenses?

http://bit.ly/358i57s

2020 – A Paradigm Shift for VDI and the Edge (IGEL)

WFH dominated the end user computing space in 2020 and created a tactical increase of VDI/DaaS use. But now organizations are looking to the future and developing strategies which will also enable a ‘work from anywhere’ approach – one that supports a return to the workplace at some point yet simultaneously provides a longer term WFH strategy.

http://bit.ly/35av1tt

Emotet Campaign Restarts After Seven-Week Hiatus

Seven weeks after the last major Emotet campaign, the cybercriminals behind the downloader have started up their attempts to compromise more systems, according to multiple cybersecurity organizations.

http://bit.ly/3rLrziC

Tuesday 1/5

Golden SAML Revisited: The Solorigate Connection (CyberArk)

Golden SAML is an attack vector that can serve sophisticated attackers in their post-exploitation stages allowing them to maintain persistency and gain access to different services in a convenient and stealthy manner.

http://bit.ly/38fJoPa

Innovation Done Right: Proactive Storage Management (Pure Storage)

Pure1 offers industry-first and industry-leading proactive support, including continuous monitoring of infrastructure, service level agreements (SLAs), and subscriptions, plus proactive issue resolution.

http://bit.ly/3rXazpB

Wednesday 1/6

Naval Information Warfare Systems Command (NAVWAR) Awards FireEye First Place in Network Threat Detection Challenge

The challenge found FireEye Network Security to deliver the best performance, based on the criteria and cost-benefit framework. The malware collection used also spanned categories likely to be seen in the real-world to produce the most effective evaluation.

http://bit.ly/35fmsOi

4 Ways to Help Your Family Combat Cyber Threats in the New Year (McAfee)

The best defense against online threats is a good offense, which is the digital space means staying informed. The more you know about how hackers exploit consumers, the more you can dodge shady phishing scams such as emails trying to sell you the COVID-19 vaccine online.

http://bit.ly/3bcMrJV

Thursday 1/7

AI at Your Fingertips: NVIDIA Launches Storefront in AWS Marketplace

To help data scientists and developers build and deploy AI-powered solutions, the NGC catalog offers hundreds of NVIDIA GPU-accelerated machine learning frameworks and industry-specific software development kits.

http://bit.ly/3hUddYW

This new phishing attack uses an odd lure to deliver Windows trojan malware

The malware uses several layers of obfuscation in order to avoid being detected as malicious activity – and it has also added new techniques in order to provide additional means of avoiding detection.

http://zd.net/3pXs33p

Friday 1/8

Our New Year’s Resolution for You: Protect Your IoT Networks and Devices! (Check Point)

We are in the business of security and we know that as the world gets smarter, the risks get higher as well – for the simple reason that as IoT devices connect to a given network it broadens the attack surface.

http://bit.ly/3bjFvuz

Reflecting on the most popular HDX innovations of the past two years (Citrix)

With every Citrix Virtual App and Desktop release, our HDX team releases a bundle of features designed to optimize the experience of virtual sessions, whether they’re minor end-user enhancements or something more significant.

http://bit.ly/2LhiTA2