Security
Cisco critical flaw: At least 8.5 million switches open to attack, so patch now
Perhaps the most serious issue Cisco has released a patch for is critical bug CVE-2018-0171 affecting Smart Install, a Cisco client for quickly deploying new switches for Cisco IOS Software and Cisco IOS XE Software.
Why Your Passwords Aren't Strong Enough—And What To Do About It
Passwords are your way into almost all of your online accounts, from social networks to email platforms, but how do you know whether the ones you’re using are strong enough to stand up to repeated hacking attempts? If you want to know how to do a self-audit on password security, and the best combinations to use to keep your data safe, we’ve asked the experts to explain.
Analysis of 560 incidents demonstrates need for cyber resilience
Many entities face the same types of security incidents – some are viewed as handling the incident well, and for some it’s a disruptive and costly lesson. The ones that fare better have prepared for an incident and use lessons-learned from prior incidents.
CIS Critical Control 12: Boundary Defense Explained
Boundary defense is control 12 of the CIS Critical Controls and is part of the network family. There are ten subsections to this control that cover your DMZ, firewalls and proxies, IDS/IPS, NetFlow, and remote access.
GoScanSSH Malware Avoids Government and Military Servers
Security experts have discovered a new strain of malware that targets vulnerable Linux-based systems and tries its best to avoid infecting devices on government and military networks.
Backup
What is Veeam Availability Orchestrator?
Veeam has recently released a new product called Veeam Availability Orchestrator (VAO). During a Long time in beta, the product has finally reached the GA stage and has been released. In this post, we’ll have a look what is Veeam Availability Orchestrator (VAO) and how it can be useful for backup administrators.
Zenis Ransomware Encrypts Your Data & Deletes Your Backups
A new ransomware was discovered this week by MalwareHunterTeam called Zenis Ransomware. While it is currently unknown how Zenis is being distributed, multiple victims have already become infected with this ransomware. What is most disturbing about Zenis is that it not encrypts your files, but also purposely deletes your backups.
GDPR
How to download a copy of everything Google knows about you
Google allows its users to download a copy of everything they have stored on the company's services, including Drive, Calendar, Gmail and Hangouts. You can download your own archive of this information from Google if you want to create a backup before deleting your Google account and moving to another service.
Virtualization
Microsoft Releases Tool for Running Any Linux OS on Windows 10
Microsoft has released a tool on Monday to help Linux aficionados in porting their favorite Linux distro to run on the Windows Subsystem for Linux (WSL), a Windows 10 component that sideloads Linux distros on modern Windows 10 PCs.
New VMware SDDC Poster – Free PDF download
There has been a new VMware SDDC poster available at VMware website which you can download. Free posters are cool so we usually promote this kind of goodies without hesitation. Hopefully, you'll enjoy it the same way as we do.
High-availability
Announcing 1.1.1.1: the fastest, privacy-first consumer DNS service
Cloudflare's mission is to help build a better Internet. We're excited today to take another step toward that mission with the launch of 1.1.1.1 — the Internet's fastest, privacy-first consumer DNS service. This post will talk a little about what that is and a lot about why we decided to do it. (If you're interested in the technical details on how we built the service, check out Ólafur Guðmundsson's accompanying post.)
Networking & Cloud
The CLOUD Act — A needed fix for U.S. and foreign law enforcement or threat to civil liberties?
While there are many issues Congressional Republicans and Democrats do not agree on, they both recognize that the Electronic Communications Privacy Act should be amended, as evidenced by bi-partisan bills recently introduced in both the House and Senate, known as the Clarifying Lawful Overseas Use of Data, or “CLOUD,” Act.
Azure Availability Zones now available for the most comprehensive resiliency strategy
We introduced Azure Availability Zones during Microsoft Ignite as part of our continuing expansion of Azure’s support for the most demanding, mission-critical workloads. Today I’m excited to announce the general availability of Availability Zones beginning with select regions in the United States and Europe.
Switch Mac Address: What’s It and How Does it Work?
You may have noticed that every piece of hardware on your local network has a MAC address in addition to the IP address. Except for switches which have switch MAC address, all devices that connected to the Internet have this unique identifying number, from desktop computers, laptops, cell phones, tablets to wireless security cameras, and even your connected refrigerator have a MAC address. So, why does your network devices need two addresses to connect to a network? Isn’t an IP address sufficient? What exactly is that MAC address for?
AI & Automation
The Malicious Use of Artificial Intelligence in Cybersecurity
Scientists from leading universities, including Stanford and Yale in the U.S. and Oxford and Cambridge in the UK, together with civil society organizations and a representation from the cybersecurity industry, last month published an important paper titled, The Malicious Use of Artificial Intelligence: Forecasting, Prevention, and Mitigation.
Cryptocurrency
Atlanta has shut down courts and people
It's been a week since hackers launched a ransomware attack against the city of Atlanta, and local officials are still grappling with its effects. "We are dealing with a hostage situation," Atlanta Mayor Keisha Lance Bottoms said in a statement. On Thursday, municipal courts were closed again and residents were unable to pay their traffic tickets or water bills online. In some cases, employees had to fill out urgent forms and reports by hand, CNN reported.
How To
WordPress: Best Practices on AWS
As most of you already know, WordPress is a popular open-source blogging platform and content management system (CMS) based on PHP and MySQL. AWS customers deploy everything from simple blogs to high-traffic, complex websites.
Fast and Complete SSL Scanner to Find Mis-configurations affecting TLS/SSL Severs-A Detailed Analysis
We are moving fast to the encrypted world and the usage of TLS certificates increased dramatically.Transport Layer Security is the main feature of TLS/SSL certificates, but it also aids in performance and SEO.
Comment