Blog

By Ken Phelan, Posted in

Let your ‘Yes’ be ‘Yes’ and your ‘No’ be ‘No’. For whatever is more than these is from the evil one. Mathew 5:37 At Gotham, we sell a lot of products and consulting to a lot of customers (thankfully). We get to see many of them succeed and we’ve unfortunately seen some fail. We try to share that experience to make our customers as successful as possible. Sometimes we even write blogs so that random strangers can potentially be more successful. That&rsqu... read more.

  • June 22, 2016

By Ken Phelan, Posted in

Over time, the value we get from a piece of software generally increases. The software matures. There are more features and, hopefully, fewer bugs. More importantly, we simply use it better. It’s fully deployed. We’ve figured out where and why to use it in our organization. Once we’ve been in production for a couple of years, it’s like any other relationship. We may look wistfully at some green grass on the other side of the fence every now and then, but we’re happy with the de... read more.

  • June 13, 2016

By Nancy Rand, Posted in Uncategorized

May 31, SecurityWeek – (International) 65 million users affected by Tumblr breach. Tumblr officials reported that as a precaution, they have reset all their customers’ passwords after an Australian security researcher found that a hacker under the online name, “peace_of_mind” posted the information of 50 million Tumblr accounts on a darknet Web site called, “The Real Deal” for a small sum of money. The same hacker was also seen selling millions of records of LinkedIn, Fling.com, and Myspace users. Source ... read more.

  • June 01, 2016

By Nancy Rand, Posted in Security

May 26, SecurityWeek – (International) Angler EK malvertising campaign abuses recent Flash zero-day. Security researchers from Malwarebytes reported that a previously patched zero-day flaw in Adobe Flash Player was being exploited in a new malvertising campaign targeting ad networks through a conditional malicious code which redirects users to the Angler exploit kit (EK) after executing fingerprinting checks. Attackers exploit the vulnerability via specially crafted Microsoft Office documents. Source May... read more.

  • May 31, 2016

By Nancy Rand, Posted in Security

May 26, SecurityWeek – (International) “Wekby” group uses DNS requests for C&C communications. Security researchers from Palo Alto Networks discovered that an advanced persistent threat (APT) group named Wekby, APT 18, Dynamite Panda, and TG-0416, was using the “pisloader” malware to infiltrate a system via Domain Name System (DNS) requests for command & control (C&C) communications, which allows the malware to bypass security products. The “pisloader” malware was believed to be a variant of the... read more.

  • May 27, 2016

By Nancy Rand, Posted in Security

May 25, Softpedia – (International) Fiverr removes DDoS-for-Hire services from its marketplace. Fiverr banned and removed a series of ads reportedly providing distributed denial-of-service (DDoS)-related offerings on its marketplace Web site after security researchers from Incapsula found several DDoS services. Source May 25, Softpedia – (International) Hackers take over thousands of Twitter accounts and tweet out adult content. Symantec discovered that over 2,500 Twitter accounts were compromised after... read more.

  • May 26, 2016

By Nancy Rand, Posted in Security

May 23, SecurityWeek – (International) Exploit for recently patched flash flaw added to Magnitude EK. A French security researcher discovered that attackers were integrating the Magnitude exploit flaw against previously patched Flash Player 21.0.0.213 installations to potentially deliver various pieces of malware, including Locky and Cerber ransomware. The exploit was not fully implemented in Magnitude and researchers advised users to be cautious of the exploit. Source May 21, Softpedia – (International)... read more.

  • May 25, 2016

By Stephen Kilcoyne, Posted in Virtualization

CITRIX SYNERGY 2016, Las Vegas, May 24, 2016 — M7 Global Partners, a consortium of leading U.S. IT consulting firms widely recognized for their commitment to serving as trusted advisors in the deployment of Citrix solutions, will showcase their technical expertise and demonstrate how organizations can leverage advanced IT infrastructure, virtualization and cloud solutions to solve their most pressing business challenges, this week at Citrix Synergy 2016 in Las Vegas. Representing M7 Global Partners o... read more.

  • May 25, 2016

By Nancy Rand, Posted in Uncategorized

May 20, The Register – (International) 60 percent of Androids exposed by new attack on mediaserver. A security researcher from Duo reported that about 60 percent of enterprise Android phones running Lollipop version 5 operating system (OS), KitKat version 4.4, and Marshmallow version 6 OS were susceptible to a Qualcomm Secure Execution Environment (QSEE) vulnerability after researchers discovered the flaw in the mediaserver component that could allow an attacker to gain complete control over the device by t... read more.

  • May 23, 2016

By Ryan Lee, Posted in Infrastructure

Leveraging Citrix StoreFront High Availability and Subscription Synchronization As consultants, engineers, and architects we are regularly challenged with complex scenarios each with their own very specific requirements. These scenarios can really put our skill set to the test and require us to sometimes think outside of the box to achieve our customer’s or companies’ end goal. I have been working with Citrix for nearly 12 years in some form or capacity, with the last 5 years geared primarily towards desig... read more.

  • May 23, 2016