Bumblebee Malware is back with evolving tactics: How EventLog Analyzer can help protect your organization 

In a surprising development, Bumblebee Malware (a popular malware downloader) has resurfaced with an approach that was believed to be long gone: VBA macro-enabled documents....

Log360 3 min read Read

Firewall attacks in history and tips to enhance your firewall security

Firewalls are the guardian of your network, effectively blocking unnecessary ports and potentially harmful IP addresses. With a list of ports or IP addresses to...

Log360 3 min read Read

Peer reviews: Your map in the maze of IT product choices

“Back in 2007, market research firm Yankelovich ran a survey of 4,110 people and found out that the average person sees up to 5,000 ads...

AD360 , General 3 min read Read

How your favorite apps use protocols: A look at real-world scenarios

  Ever wondered how computers and servers talk to each other without descending into chaos? It’s all thanks to network protocols—the unsung heroes of the...

Log360 4 min read Read

What is a Secure Socket Layer (SSL)? How does it ensure safe connection?

Imagine all your online activity being put out in the open—as private as a billboard in Times Square. Before SSL, your private internet information was vulnerable...

General , Log360 3 min read Read

Active Directory security: Exploiting certificate services

Active Directory (AD) is crucial for an organization’s identity and access management strategy, but its complex architecture is also a prime zone for overlooked vulnerabilities....

AD360 2 min read Read

Microsoft Word’s recent glitch deleted documents when saving them

Have your users spent hours working on a document in Microsoft Word, only to have it disappear when they try to save it? A recent...

Active Directory , RecoveryManager Plus 2 min read Read

ManageEngine recognized in the 2024 Gartner® Market Guide for Identity Governance and Administration

We’re proud to announce that ManageEngine has been recognized as a Representative Vendor in Gartner® 2024 Market Guide for Identity Governance and Administration! We believe...

AD360 , General 3 min read Read

The states of data, Part 3: Data in use and why you need to keep an eye on file activities

In our previous blog, The states of data, Part 2: Why visibility is key for protecting data at rest, we discussed the importance of discovering...

DataSecurity Plus , DataSecurity Plus 4 min read Read