-
How Your Attack Surface is Reduced, Moving to Serverless (Post)
Serverless is a new approach to application architecture and deployment. Security becomes both easier and harder, and it is nuanced. In this post, we will go over: what got better, what got more chal ...
-
The Top Three Storage Problems Object Storage Can Solve for You (Post)
The first step in evaluating any technology should be to determine what problems you are trying to solve. Said another way for businesses, how will this new technology enable your IT team to save t ...
-
Evolution of Cyber Threats in OT Environments (Post)
Significant Cyberattacks on OT Environments and ICSBy evaluating the most significant ICS cyberattacks over the past decade, we can witness just how far threat actors have come in their technical cap ...
-
Beware scams exploiting coronavirus fears (Post)
From malware-laden emails to fake donations, these are some of the most common cons you should watch out for amid the public health crisisWe are currently experiencing an unprecedented global event.
-
Threat Spotlight: How attackers are targeting your web applications right now (Post)
The number of attacks targeting web applications and application programming interfaces (APIs) has increased significantly. Barracuda mitigated more than 18 billion attacks against applications durin ...
-
3AM: New Ransomware Family Used As Fallback in Failed LockBit Attack (Post)
Attackers resorted to new ransomware after deployment of LockBit was blocked on targeted network.A new ransomware family calling itself 3AM has emerged. To date, the ransomware has only been used in ...
-
Step-by-step through the Money Message ransomware (Post)
Money Message is an insidious ransomware family known for resisting detection and remediation in various ways. We walk through a recent case In August 2023, the Sophos X-Ops Incident Response team wa ...
-
Critical Apache Log4j Vulnerability Updates (Post)
Log4j VulnerabilitiesBeginning December 9th, most of the internet-connected world was forced to reckon with a critical new vulnerability discovered in the Apache Log4j framework deployed in countle ...
-
NVIDIA Delivers Quantum Leap in Performance, Introduces New Era of Neural Rendering With GeForce RTX 40 Series (Post)
Powered by Ada Lovelace Architecture and DLSS 3; Third-Gen RTX up to 4x Faster Than NVIDIA Ampere Architecture GPUsNVIDIA today unveiled the GeForce RTX® 40 Series of GPUs, designed to deliver revolu ...