Category: Featured
Tech Time Warp: Origins of the term “computer virus”
Now, nearly four years since the word “coronavirus” entered the popular lexicon, who doesn’t feel like an amateur epidemiologist? Given world events, it should be easy to understand why Leonard Adleman—the “A” of the RSA algorithm—was inspired by the graduate...
Essential tips and strategies for protecting against ransomware
In September, MGM Resorts faced system outages (affecting hotel room keycard systems and slot machines) and service disruptions at its Las Vegas properties. Caesars Entertainment also reported suffering a data breach that revealed its loyalty program members’ Social Security and driver’s license...
Cybersecurity Threat Advisory: Bibi-Windows Wiper on the rise
Israel has recently been the target of cyberattacks involving a wiper malware that was previously observed to target both Linux and Windows systems. The wiper, named “BiBi-Windows Wiper”, has been used by a pro-Hamas hacker group in the wake of...
The race to deliver managed generative AI services is on
While there is a massive amount of interest in all things relating to generative artificial intelligence (AI), the number of organizations that have the skills and resources required to fully exploit it remains limited. Under the hood of generative AI...
Pioneers in Tech: Gene Amdahl, “father” of mainframe computing
When you walk around with a computer in your hand or on your wrist, it’s easy to forget how much of the world still runs on mainframe computers. In this Pioneers in Tech, we look at how an estimated 10,000...
Becoming a smarter MSP with AI-powered automation
The problem with being a ‘smarter’ MSP is that it may often require investment. For those who don’t have a rainy day fund set aside, it would mean dipping into the revenue to stay competitive and maintain margin, which can...
Utilizing news resources as a cybersecurity tool
One of the best cybersecurity tools isn’t fancy software or a skilled engineer (both of which are important and have their place). Instead, it is something that doesn’t even cost a cent: news and information. “I work with a lot...
Cybersecurity Threat Advisory: Urgent Veeam ONE vulnerabilities
Several serious security flaws have been found in the Veeam ONE platform for analytics and IT infrastructure monitoring. These vulnerabilities may result in data breaches, illegal access, and NTLM hash theft. To fix these problems, Veeam has published security patches...
Cybersecurity Threat Advisory: HelloKitty group targets Apache
This Cybersecurity Threat Advisory discusses a new critical security flaw that was discovered in the Apache ActiveMQ open-source message broker service. This security flaw can potentially result in remote code execution, which is currently being exploited by the HelloKitty ransomware...