Identity Management

Identity Management

AWS Server User Management as a Service

AWS Server User Management as a Service

/
Amazon Web Services (AWS) is an Infrastructure-as-a-Service (IaaS) platform that offers a wide range of cloud based IT resources like compute services, applications, data storage, and infrastructure for modern organizations.... The post ...

SSD Advisory – Cambium Multiple Vulnerabilities

/
Vulnerabilities Summary The following advisory describes three (3) vulnerabilities found in Cambium Network Updater Tool and Networks Services Server. The Network Updater Tool is “a free-of-charge tool that applies packages to upgrade ...
WPA2 Alternative

WPA2 Alternative

/
With the KRACK WPA2 vulnerability making headlines in October 2017, many IT admins are asking if there is a WPA2 alternative that is safer. The short answer is not really.... The post ...
Google studies effects of leaked logins

Google studies effects of leaked logins

/
Passwords are your first line of defense against hackers. But over the years, they have developed plenty of methods to steal them. To gain a deeper understanding of how cybercriminals operate, Google ...
The Office in a Box: the JumpCloud + Meraki Blueprint for Cloud-Controlled Networking

Active Directory as a Service & RADIUS Authentication

/
As IT organizations continue to look for ways to step up their security efforts, the network is an area of constant scrutiny. Sys admins and IT directors alike recognize that... The post ...

SSD Advisory – DblTek Multiple Vulnerabilities

/
Vulnerabilities summary The following advisory describes 2 (two) vulnerabilities found in DblTek webserver. DBL is “specialized in VoIP products, especially GoIPs. We design, develop, manufacture, and sell our products directly and via ...
Case Study: Ooyala Goes Global

Case Study: Ooyala Goes Global

/
Ooyala is one of the leading providers of various software and services that focus on producing, streaming, and monetizing over-the-top video. They have a large group of remote workers and... The post ...
Managing Systems with JumpCloud | Whiteboard Video

Mac Enterprise Management – Users & Systems

/
Macs have infiltrated the enterprise – a domain that once was in the firm clutches of Microsoft Windows. Over the last several years, Mac enterprise management for both users and... The post ...
Australian Broadcasting Corporation Leaked Data through AWS S3 Bucket

Australian Broadcasting Corporation Leaked Data through AWS S3 Bucket

/
The Australian Broadcasting Corporation (ABC) leaked sensitive data online through a publicly accessibly Amazon Web Services (AWS) S3 bucket. Public search engine Censys indexed the misconfigured asset on 14 November during a ...

Ransomware via RDP (Remote Desktop Protocol)

/
For Sophos, Mark Stockley describes how scammers are using RDP, a tool intended to cut down network and system administration costs for companies by allowing sysadmins and help-desk operators to access their ...
Loading...