Managed Services

Emerging Threat - CopyKittens APT activity Matryoshka is malware built by CopyKittens, an espionage group that has been attacking Israeli targets. Matryoshka is spread through spear phishing with a document attached to it. The document has either a malicious macro that the victim is asked to enable or an...

According to the Identity Theft Resource Center (ITRC), as of December 8th, the number of breaches captured on the 2015 ITRC Breach Report totals 732, surpassing last year's record high pace for the same time period (726). With 15 breaches added to the 2015 ITRC Breach List during the past week,...

Emerging Threat - CherryPicker PoS CherryPicker PoS is a point-of-sale malware that researchers at Trustwave say is unique because it uses configuration files, encryption, obfuscation and command line arguments to avoid detection. Researchers identified the malware being used to target the food industry and said it can target virtually...

Emerging Threat - KilerRAT KilerRAT is a remote access trojan (RAT) that can be classified as a variant of the well known Njrat, as they share many similar features such as their display style, several abilities and a general template for communication methods. However, where Njrat left...

Since the introduction of Microsoft’s Office products back in 1988, the suite has been primarily used by individuals performing any number of tasks. Those include word processing, presentations, spreadsheets, and more. While Office certainly made a lot of people more proficient at their jobs, the suite...

Technology changes at a rapid pace. Everyday we see new operating systems, improved application development platforms, and scalable solutions that allow businesses to make real-time decisions. These changes are often difficult to keep up with, much less understand. As the demand for new and improved...

Protecting yourself when browsing online has become much more difficult, but with a little diligence you can significantly increase your cyber safety. While the following three security tips seem like common sense, only a few of us actually apply them to our own security practices. 1. Use...

Managed services: What are they exactly? Can my company use managed services? Do we need managed services? In a very exact sense, managed services are defined as “the practice of outsourcing day-to-day management responsibilities and functions as a strategic method for improving operations and cutting expenses.” This essentially means outsourcing...

The Oracle Cloud Platform is one of the most robust tools for managing your cloud-based software and computing needs. Most businesses however, have not moved their entire infrastructure to the cloud. Many businesses are now using a hybrid cloud approach that includes using the cloud...