article thumbnail

Kaseya Left Customer Portal Vulnerable to 2015 Flaw in its Own Software

Krebs on Security

The attackers exploited a vulnerability in software from Kaseya , a Miami-based company whose products help system administrators manage large networks remotely. Mandiant notified Kaseya after hearing about it from Alex Holden , founder and chief technology officer of Milwaukee-based cyber intelligence firm Hold Security.

Software 277
article thumbnail

MY TAKE: How SMBs can improve security via ‘privileged access management’ (PAM) basics

The Last Watchdog

Privileged accounts assigned special logon credentials to system administrators in charge of onboarding and off boarding users, updating and fixing IT systems and carrying out other network-wide tasks. A number of big-name IAM vendors are heavily pitching cool advances in enterprise-grade IAM and PAM technologies, he says.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Orcus RAT Author Charged in Malware Scheme

Krebs on Security

The accused, 36-year-old John “Armada” Revesz , has maintained that Orcus is a legitimate “ R emote A dministration T ool” aimed at helping system administrators remotely manage their computers, and that he’s not responsible for how licensed customers use his product. An advertisement for Orcus RAT.

Malware 196
article thumbnail

MY TAKE: A path for SMBs to achieve security maturity: start small controlling privileged accounts

The Last Watchdog

The software giant’s intent was to make it more convenient and efficient for system administrators to perform Windows upkeep. RDC emerged as a go-to productivity tool, and similar controls swiftly emerged for Macs, IoS, Android and other operating systems in wide use. Password concierge. That’s much easier said than done.

article thumbnail

Announcing Duo’s Vision to Streamline Authentication & Enhance User Experience

Duo's Security Blog

During the workday, on the other hand, I spend a lot of time talking to systems administrators, security operations analysts, and IT professionals who do love MFA. Compare this to climbing the hill of Windows Logon, VPN logon, and web application logon - all with username, password, and Duo prompt - just to get to work in the morning.

article thumbnail

Career Choice Tip: Cybercrime is Mostly Boring

Krebs on Security

The researchers concluded that for many people involved, cybercrime amounts to little more than a boring office job sustaining the infrastructure on which these global markets rely, work that is little different in character from the activity of legitimate system administrators.

article thumbnail

Top IT Areas You Need to Check to Strengthen Your Cybersecurity

CyberSecurity Insiders

Today, technological advances have seen a rise in cyber security threats globally. Besides, cybercriminals are becoming craftier with sophisticated technology. Thus, it would be best if you secured all networks by incorporating firewalls and advanced encryption technology. Human Resources. Data Security.