-
Improvements of CloudGuard IaaS in the latest release of R80.40 Unified Security (Post)
Earlier this year, Check Point released the latest version of Unified Security, R80.40, which brings major improvements to CloudGuard IaaS.R80.40 helps improve the efficiency of cloud security engine ...
-
ASRock Introduces Challenger Series Gaming Monitors: CL25FFA and CL27FFA (Post)
ASRock, a global leader in manufacturing motherboards, graphics cards, mini PCs, gaming monitors, and power supply units, has expanded its product lineup by introducing two light gaming monitors, the ...
-
The Future of Direct-attached Storage is “Better Together” (Post)
PowerVault MD Series simplifies the challenges of server capacity expansion and delivers high-speed application access to data.Regardless of scale, IT business advantages often occur when innovative ...
-
Password managers can make your network more secure – but mind the gaps (Post)
It seems odd to imagine that one piece of software, which doesn’t even require a network connection, can improve the safety of your online life. But password managers certainly appear to fall into ...
-
HOW TO NAIL A CLOUD BACKUP AND DISASTER RECOVERY IMPLEMENTATION (Post)
In today’s age of always available expectations, you simply can’t afford to have downtime. That’s where the successful implementation of a cloud backup and disaster recovery (DR) solution comes in.
-
July‘s Most Wanted Malware: Emotet Strikes Again After Five-Month Absence (Post)
Since February 2020, Emotet’s activities, primarily sending waves of malspam campaigns started to slow down and eventually stopped, until re-emerging in July. This pattern was observed in 2019 when t ...
-
Facing down the myriad threats tied to COVID-19 (Post)
Unscrupulous marketers and cyber-criminals have seized upon concerns over the emergence of the COVID-19 global pandemic as bait for spam, phishing attacks and malware. In recent weeks, the use of “co ...
-
Simple defense against complex attacks (Post)
As logic suggests, an attack on a company makes sense only if the potential profit outweighs the organizational cost. Until fairly recently, cybercriminals guarded their know-how from each other like ...
-
REvil Ransomware Gang Flexes Its Hiring Muscle With a $1 Million Deposit on a Hacking Hiring Website (Post)
Nothing says ransomware is a profitable business than throwing down a million dollars in an attempt to attract and hire the most talented hackers on the planet.Just when you think you’ve seen everyth ...
-
Microsoft 365 Phishing Attacks Masterfully Use Brand Name Sites to Establish Legitimacy (Post)
New voicemail phishing scam uses legitimate branded domains from companies like Samsung and Adobe to facilitate redirects to compromised websites intent on stealing credentials.It’s an age-old campai ...
-
Team Group Launches NV5000 M.2 PCIe 4.0 SSD — First in New NV Series (Post)
NV5000 M.2 PCIe 4.0 SSD, marking the debut of its brand-new NV (Nova Value) series. Designed to deliver a strong mix of performance, quality, and affordability, the NV5000 targets both desktop and la ...
-
Ransomware Payments Increase by a Massive 60% as Email Phishing Rises in Frequency as Primary Attack Vector (Post)
The newest ransomware data paints a pretty bleak picture for organizations with “big game” attacks and six- and seven-figure ransom demands becoming the norm.We’d all like to see ransomware attacks s ...