Why We’re Thankful for You – the Network Security Professional

Network security professionals are unsung heroes. Everyday news app visitors won’t read about all the wonderful work you’re doing. On occasion, they’ll only see and read about fellow professionals having the worst ...

PKI for Microsoft GPO

Microsoft’s Group Policy Object (GPO) is a useful tool to allow administrators to control the level of access for users on the network. In addition to providing strong security from outside threats, ...

The History of Cybersecurity | Avast

| | Security News
Many species evolve in parallel, each seeking a competitive edge over the other. As cybersecurity and technology have evolved, so have criminals and ‘bad actors’ who seek to exploit weaknesses in the ...

Apple-Notarized Malware: What It Is and How It Affects Mac Users

Malicious actors are targeting Apple. Although Apple introduced a notarization mechanism to scan and prevent malicious code from running on Apple devices, attackers have found ways to circumvent this process. Such Apple-notarized ...
New Mount Locker Ransomware Version Targeting TurboTax Files

New Mount Locker Ransomware Version Targeting TurboTax Files

A new version of the Mount Locker crypto-ransomware strain is specifically targeting victims’ TurboTax files. As reported by Bleeping Computer, Advanced Intel’s Vitali Kremez came across a new Mount Locker sample that ...

Twitter Names Hacker Mudge Head of Security | Avast

| | Security News
CEO Jack Dorsey has tapped Peiter Zatko, otherwise known as famed white-hat hacker “Mudge,” as the new head of security at Twitter. Zatko is undergoing a review period for 45-60 days before ...
™

Thycotic Recognized as a Leader in Privileged Identity Management (PIM) by Independent Research Firm

| | Company News
Thycotic receives highest possible score in criteria of Saas/Cloud and innovation roadmap ...
Phishers Using Redirector Sites with Custom Subdomains for Evasion

Phishers Using Redirector Sites with Custom Subdomains for Evasion

Malicious actors launched a phishing attack that’s using redirector websites with custom subdomains in order to evade detection. On November 16, Microsoft Security Intelligence tweeted out that it had spotted the phishing ...

Privacy In The Age Of Pandemic | Avast

| | Avast News
2020 has been an odd year, to say the least. But one thing has stayed familiar: As we’ve moved more aspects of life online, cybersecurity and privacy threats have adapted to the ...
™

Thycotic Named to 2020 Deloitte Technology Fast 500 for Fifth Consecutive Year

| | Company News
Company recognized for the fifth consecutive year ...