North Korean hackers taint PuTTY SSH client with malware

Mandiant has reported an instance in which a group of North Korean hackers tainted the PuTTY SSH client through a malicious ISO package.

The issue

In July 2022, during a session of identifying non-remediated threats, Google-owned cybersecurity firm Mandiant Managed …

General 3 min read Read

Five worthy reads: Internet of Behavior–Snooping through the digital debris

Five worthy reads is a regular column on five noteworthy items we’ve discovered while researching trending and timeless topics. This week we are exploring Internet of Behavior, which can help organizations make the best decisions in providing a customized experience …

General 3 min read Read

Happy IT Professionals Day! A huge shoutout to all the IT pros

It’s the coolest day of the year again—time to honor and celebrate the people who work behind the scenes to keep our businesses running: IT professionals!

Established in 2015, IT Professionals Day is celebrated each year on the third Tuesday …

General 3 min read Read

[Indonesia seminar] Why it’s crucial to implement AIOps in today’s ITOM

Due to the growing popularity of digital platforms among a wider range of industries, ITOps teams are facing an increasing number of challenges in monitoring, data correlation, and data management. Today’s ITOps have to be dynamic and collaborative to face …

General 2 min read Read

Five worthy reads: Is extended reality a safe space for advancements in digital transformation?

Five worthy reads is a regular column on five noteworthy items we’ve discovered while researching trending and timeless topics. In this edition, we will learn about the privacy concerns associated with extended reality technology.

Businesses all over the world are …

General 3 min read Read

Security use cases: The key to test the readiness of your SIEM solution

Organizations have started considering cybersecurity as a top priority lately. The amount of money invested in IT infrastructure is increasing at an exponential rate. Further, dedicated teams are formed to monitor and optimize the performance of the different solutions that …

General , IT Security 3 min read Read

5 best practices for optimizing IP address management

Ever discovered an IP issue only after an end user reported it? If yes, you are not alone! Many network admins without a proactive monitoring solution in place have to constantly deal with recurring IP issues such as IP conflicts …

General 2 min read Read

Five worthy reads: Clean up your digital footprint

Five worthy reads is a regular column on five noteworthy items we have discovered while researching trending and timeless topics. This week, we delve into digital footprints for individuals, organizations, and explore how much power these “e-footprints” have over us.

General 3 min read Read

Guide to keeping cyber insurance premiums low amidst rising threats

Cyberattacks have become an unavoidable part of the technology landscape in recent years with attacks like ransomware, phishing, and whaling reaching an all-time high. According to IBM’s Cost of Data Breach Report 2022, the average cost of a …

General 2 min read Read