

Press Release
Updates/Articles from our Partners
How to protect the network from insider threats | Emsisoft
Originally published by Emsisoft. Ransomware groups are using insiders to gain access to corporate networks. Get practical advice on how to protect your organization from insider threats.
Read More
Stop Crypto Kleptos in Their Tracks | DomainTools
Originally published by DomainTools. DomainTools recent research illustrates that early detection of phishing campaigns and other malicious, brand-threatening behavior are crucial as these organizations continue to gain in popularity.
Read More
PCI-DSS Got an Update – What Does Version 4.0 Mean for Your Compliance Requirements? | Reflectiz
Originally published by Reflectiz. PCI-DSS is going through some changes! The Payment Card Industry standards are one of the most important compliance regulations for any business that takes online payments, and it’s been 4 long years since the last update.
Read More
A Closer Look at Identity and Access Management in 2022 | Devolutions
Originally published by Devolutions. Today marks the second annual “Identity Management Day.” Launched in 2021 by the Identity Defined Security Alliance (IDSA), this special day is to educate organizational leaders and IT decision-makers on the importance of key aspects of identity and access management (IAM).
Read More
Why WAF and Firewall Solutions Will Not Help Against Third-Party Website Attacks | Reflectiz
Originally published by Reflectiz. This article will walk you through the limitations of what a WAF or a perimeter firewall can achieve, and why it’s not enough to handle today’s threat landscape.
Read More
SPM55: Ascending the Ranks of Indonesian Phishing As A Service Offerings | DomainTools
Originally published by DomainTools. Although SPM55 is a relative newcomer to the Indonesian cybercrime community, a marked uptick in activity and known customers over the last several months suggests this group seeks to scale their business operation.
Read More
New in 2022.4: Endpoint Detection and Response Beta with deep threat insights | Emsisoft
Originally published by Emsisoft. A major improvement of our EDR solution which now provides deep threat insights that allow you trace back the origin of a malware threat.
Read More
8 Best Content Security Policies for 2022 | Reflectiz
Originally published by Reflectiz. Content Security Policies can vary, and what makes one policy better than another can depend on your site’s specific needs. Reflectiz collected top eight recommendations for 2022 for you to pick and choose what may work best with your existing CSP, your other cybersecurity policies.
Read More
New in 2022.2: Improved user experience | Emsisoft
Originally published by Emsisoft. Emsisoft Anti-Malware awarded VB100 in March 2022 certification tests by Virus Bulletin.
Read More
Reflectiz Version 4.3.1 is now live
Reflectiz just released their version 4.3.1 with upgraded abilities.
Read More
HaloITSM awarded with 6 badges for G2 Spring 2022
Based on thousands of reviews within the IT Service Management sector on G2, HaloITSM has been awarded with 6 badges for the Spring of 2022.
Read More
Stimulsoft Reports and Dashboards. New version 2022.2 released
Stimulsoft have added new elements in their new release, extended the functionality of existing components, and optimized the work of products for more rapid and convenient data analysis.
Read More
Ways to protect the password before the user receives their first password | FastPassCorp
Originally published by FastPassCorp. Nobody wants a user’s password to be in the hands of other people than the user herself. We do however have situations where the user needs help with the password. This can be solved with password self-service.
Read More
Remote Desktop Manager Now Complies with FIPS 140-2 Annex A Approved Encryption Functions | Devolutions
Originally published by Devolutions. Devolutions has announced that the latest edition of Remote Desktop Manager 2022.1 is now compliant with FIPS 140-2 Annex A approved encryption functions.
Read More
What’s New for UserLock 11 | IS Decisions
Originally published by IS Decisions. UserLock is the go-to access management solution for on-premises and hybrid Active Directory (AD) organizations of any size.
Read More
Apple Mobile Devices and iOS Acquisition Methods | Elcomsoft
Originally published by Elcomsoft. Along with the version of iOS/watchOS/iPadOS, the SoC is one of the deciding factors that affects the data extraction paths available in each case. Read this article to better understand your options for each generation of Apple platforms.
Read More
How to use Azure AD single sign-on to log in to PRTG | Paessler
Originally published by Paessler. One of the most-anticipated features was single sign-on (SSO) with Azure Active Directory. What this new functionality does is let you utilize your Azure AD credentials to sign on to PRTG.
Read More
How to avoid API blind spots in web application security testing | Netsparker
Originally published by Netsparker. APIs are a crucial part of modern web application development and make up a large chunk of your total web attack surface. Learn how Invicti helps organizations make API vulnerability testing an integral part of their secure SDLC.
Read More
What is server-side request forgery (SSRF)? | Acunetix
Originally published by Acunetix. Server-side request forgery (SSRF) is the only type of vulnerability that has its own category in the OWASP Top 10 2021 list. Several major cybersecurity breaches in recent years involved the use of SSRF as one of the break-in techniques.
Read More
PRTG v. 22.1.74 comes with 3 beta sensors and security improvements | Paessler
Originally published by Paessler. The first release of PRTG Network Monitor in 2022 is version 22.1.74, and is available in the stable release channel. It includes 3 beta sensors and a major security improvement.
Read More
New in 2022.2: Improved user experience | Emsisoft
Originally published by Emsisoft. Emsisoft made a series of smaller user experience improvements on both the desktop as well as in the Management Console.
Read More
Why Monitoring Your Network Monitor is the Fail-Safe You Didn’t Know You Need | Nagios
Originally published by Nagios. Nagios addressed the items that should be monitored to help you find more flow, and another one to address in this article: the underrated monitoring of your monitoring solution itself.
Read More
What Makes A Good IT Ticket Management System? | Faronics
Originally published by Faronics. The reasons why helpdesks came into existence, then became far more systemised, are obvious: businesses needed to know exactly the demands placed on their IT departments, to quantify and then solve the most common drains on staff time, to allocate the right people to the right tasks, and to measure effectiveness of response.
Read More
FastPass IVM certified for ServiceNow Store
Originally published by FastPassCorp. ServiceNow customers now can find information about the integration between FastPass IVM and ServiceNow Store and can connect directly to FastPassCorp for download and a trial test.
Read More
Is the reactiveness of your security system enough? | Bfore.AI
Originally published by Bfore.AI. Anti-virus & anti-malware vendors preach about how they can detect intrusions. However, is it a myth or reality?
Read More
Agent-based full file system and keychain extraction: now up to iOS 14.8 | Elcomsoft
Originally published by Elcomsoft. iOS Forensic Toolkit 7.10 brings low-level file system extraction support for a bunch of iOS versions. This includes the entire range of iPhone models based on the A11, A12, and A13 Bionic platforms running iOS 14.4 through 14.8.
Read More
Y2K22 Exchange Bug Cripples Emails | Lansweeper
Microsoft was undoubtedly the first to surprise everyone in the new year. An issue in Exchange's antivirus engine is causing email delivery to fail on Exchange 2019 and Exchange 2016 servers. Luckily Microsoft provided mitigation using a script while a patch is in the works.
Read More
December 2021 update for Netsparker Standard 6.3
The highlights of the Netsparker Standard December release are software composition analysis (SCA), the OWASP Top Ten 2021 Report, and support for scanning GraphQL APIs.
Read More
New in 2022.1: Improved user interfaces on desktop and in web app | Emsisoft
In Emsisoft first update of 2022, there will be a major design and usability update for their protection software as well as the entire web app.
Read More
Infiltrating Internal Networks with Log4Shell | Reflectiz
Reflectiz begins to grasp the scope of events that followed the discovery of CVE-2021-44228, also known as ‘Log4Shell’, and its impact on the information security world.
Read More
This is How You Can Spot Fake Domains | Bfore.AI
Originally published by Bfore.AI. Have you ever wondered if the internet was 100% trustworthy ? If you answered yes, then you have the right to be in doubt.
Read More
Why Using SMS Authentication for 2FA Is Not Secure | IS Decisions
SMS two-factor authentication is one of the most widespread types of multi-factor authentication (MFA). You don’t need any apps or digital keys, and it’s not tied to a specific ecosystem. Unfortunately, it’s also not a secure MFA method.
Read More
Gartner Report Takes a New Look At Vulnerability Management | ArcusTeam
IoT devices are making their way into every facet of life and business, with almost 4.8 billion IoT devices in use today. The abundance of these devices leaves gaping holes for attackers to capitalize and pivot to larger targets inside your organization.
Read More
The Log4J Vulnerability in Bing Domain | Reflectiz
Reflectiz platform detected a Log4J vulnerability in a domain owned by Microsoft. The Bing domain is now patched and secure, but what about the others?
Read More
December Major Update of ImmuniWeb Discovery
ImmuniWeb® new free cloud security test enables cybersecurity and IT professionals to identify unprotected cloud storage of their organizations in a simple and swift manner to prevent data leaks and security incidents.
Read More
Flexible working is here to stay | RealVNC
The pandemic has changed the way we work, forcing companies to adjust their businesses so that employees can perform their tasks in a safe manner. Of course, no one could have predicted that flexible/remote working would become something we would prefer.
Read More
Scanning for the Log4J In Your Digital Vendors | Reflectiz
Reports published on the 9 December 2021 have it that information security researchers discovered a critical security vulnerability in the logging library log4j. The discovery turned the cybersecurity world into turmoil, indicating a supply chain vulnerability that compromised the world’s biggest applications, cloud services, and other software services.
Read More
New version of FastReport Mono 2022.1 | Fast Reports
The release of version 2022.1 in FastReport Mono took place. A large number of new features and changes have been made.
Read More
New version of FastReport .NET 2022.1 | Fast Reports
The release of version 2022.1 in FastReport .NET took place. A large number of new features and changes have been made.
Read More
PRTG v. 21.4.73 comes with a new user interface, API and a new probe | Paessler
The release of PRTG Network Monitor version 21.4.73 has been available since December 1st. Take a look at the details.
Read More
How to get monitoring data from REST interfaces | Paessler
Originally published by Paessler: Everything from gateways and firewalls through to ticket systems and weather sites offer REST APIs that let you query information. To help you harness the flexibility that REST offers, Paessler PRTG provides you with the REST Custom Sensor V2 as part of its monitoring solution.
Read More
Real-Time Surveillance via Apple iCloud | Elcomsoft
Originally published by Elcomsoft: Is surveillance a good or a bad thing? The answer depends on whom you ask. In this article we’ll cover a very unorthodox aspect of real-time surveillance: iCloud.
Read More
Building a secure SDLC for web applications | Netsparker
A predictable and efficient software development lifecycle (SDLC) is crucial for delivering modern web applications on schedule, in scope, and within budget. Let’s see how you can integrate application security best practices to create a secure SDLC.
Read More
Active Scanning: Detailed Asset Data in Seconds | Lansweeper
Active scanning is a scanning method whereby you scan individual endpoints in an IT network for the purpose of retrieving more detailed information. You send packets or queries directly to specific assets rather than passively collecting that data by "catching" it in transit on the network's traffic.
Read More
What is website security – how to protect your website from hacking | Acunetix
What is website security? How to protect your website? It is the security that protects websites from hacking.
Read More
The secret to getting results, not noise, from your DAST solution | Netsparker
A low-quality tool that merely ticks a box will do little to improve security and may generate more work than it saves. But a mature, high-quality solution can bring measurable security improvements and serve as a solid foundation for your entire AppSec program.
Read More
How can remote access save the day for healthcare IT professionals? | RealVNC
RealVNC has 19 years of experience helping the NHS, Intel, NASA and many others. As the creators of VNC software and pioneers in remote access, we have been the trusted partner of IT healthcare professionals in over 160 countries.
Read More
The CDNjs’ Remote Control Execution | Reflectiz
Imagine that you’re a threat actor. You’re looking for a vulnerability to exploit night and day, turning every stone in your path until you discover a bot that lets you implement arbitrary code by automatically updating OS Repositories hosted on the largest CDN in the world.
Read More
How to Assure The Security of Cloud Technologies | Falcongaze
Learn from Falcongaze article on how to assure the security of cloud technologies.
Read More
СyberSecurity and the Healthcare | Falcongaze
The Healthcare industry has featured in the top 5 industries attacked by cyber criminals for a number of years now. The WannaCry ransomware attack in 2017 affected many health trusts across the world and the age of cybercrimes in the healthcare had started from there.
Read More
[New Release] Devolutions Server 2021.2 Is Now Available! | Devolutions
Devolutions Server 2021.2 offers many significant additions. Devolutions Server is a full-featured account and password management platform with built-in Privileged Access Management (PAM) components.
Read More
How much of your channel process can you really “get away with” automating? | Channelyze
Originally published by Channelyze. With the entire world trying to automate everything through software, we ask the question, how much can you get away with automating?
Read More
[New Release] Password Hub Business 2021.2 Is Now Available! | Devolutions
Password Hub Business 2021.2 is now available! Password Hub Business is our highly secure, cloud-based password manager for team environments.
Read More
Robinhood data breach – What was leaked? | FastPassCorp
A hacker attack on the service desk happened for Robinhood. It happened for Twitter. 83% of service desk managers fear it can happen for them.
Read More
Vital Tips to Help You Create a Secure React Web Application | GrapeCity
In this article, you will learn about four methods that you can take advantage of to secure your React apps quickly. These are simple security practices that should not interrupt your workflow.
Read More
Netsparker adds IAST support for Node.js | Netsparker
Netsparker continues to expand its IAST capabilities, now adding a Node.js agent to deliver additional insights when scanning modern JavaScript applications.
Read More
How to use screen recording in VNC Connect | RealVNC
On RealVNC's latest update, screen recording is now part of VNC Connect! Read on to find out how to capture your great work in no time!
Read More
Onboarding your first distributor – A recipe for success | Channelyze
Originally published by Channelyze. So you’ve decided it’s a good time to partner with companies to scale your company. What is the process you are going to use to onboard the distributor or partner?
Read More
5 Ways Organizations can Reduce IT Costs through ITAM 2.0 | Lansweeper
As organizations adopt new technologies and assets to support digital transformation initiatives, and as technology spending increases, ITAM 2.0 solutions can offer significant and measurable IT cost reductions.
Read More
[New Release] Remote Desktop Manager 2021.2 | Devolutions
Say hello to version 2021.2, the next great edition of Devolutions Remote Desktop Manager is here.
Read More
How Cyber Attacks Pose a Greater Threat After Pandemic | Bfore.AI
Originally published by Bfore.AI. The pandemic is the worst time when you can be a victim of a cyber attack. However, it is also the best time to upgrade the levels of data protection.
Read More
The Five Ways to Recover iPhone Deleted Data | Elcomsoft
iOS security model offers very are few possibilities to recover anything unless you have a backup, either local or one from the cloud. In Elcomsoft article you will learn what you can and what you cannot recover in modern iOS devices.
Read More
The Top 6 Worst Tech Nightmares Haunting IT Pros | Lansweeper
Your network faces nightmares from cybercriminals, system errors and more. Time to shine a light on the seven most sinister terrors that haunt sysadmins. Welcome to the tech nightmares.
Read More
What is continuous web application security? | Acunetix
The term continuous security in the context of web application security is best understood when paired with well-known terms continuous integration and continuous deployment (CI/CD). Continuous security means that security is part of a continuous process – DevSecOps or, even better, SecDevOps.
Read More
Monitoring Modbus in industrial environments | Paessler
Modbus. It’s a fieldbus protocol that’s been around longer than many of the engineers and technicians who use it. And yet it isn’t going away. What advantages does monitoring with Modbus bring? Let’s take a look at examples of how you’d use Modbus in your monitoring concept.
Read More
The First Step to Making Cloud Computing More Cost-Effective | Lansweeper
Cloud migrations have become increasingly popular among corporations and for obvious reasons. Digital transformation through cloud adoption is top-of-mind for every business, regardless of industry, shape, and size. But moving assets from physical or hybrid hosting servers to a cloud service poses specific strategic and technical challenges for a business.
Read More
The secret world of the hidden channels – A market worth attempting? | Channelyze
Originally published by Channelyze. With China coming in second on the world index of GDP, now is a better time than ever to enter the Chinese market but how does it work?
Read More
Cybersecurity Month: 6 Ways to Avoid Phishing | TSFactory
It’s nearly the end of Cybersecurity Awareness Month 2021 and TSFactory is highlighting how to prevent phishing attacks. Below are important tactics your organization can take to prevent phishing attacks. Originally published by TSFactory.
Read More
iCloud Extractions Without Passwords and Tokens: When a Trusted Device is Enough | Elcomsoft
Many are looking for a one-click solution for mobile extractions and data decryption. Elcomsoft is going to make your life a notch more complex by introducing a new iCloud authentication option you’ve never heard of before.
Read More
Why You Need a Digital Inventory | Reflectiz
Whether monetizing, analytics, or even customer interaction, these website digital applications are integral to your website’s supply chain, as developers don’t write all of their code by themselves. They integrate external scripts and frameworks into the existing website’s code. Orginally published by Reflectiz.
Read More
The mysterious art of channel marketing | Channelyze
Originally published by Channelyze. We need to understand the role of the channel marketer and where they fit into the grand scheme of things.
Read More
Stop the Frustration and Risk of Unchecked Access to Files and Folders | IS Decisions
Following the recent updates to FileAudit, the article discuss how automated responses to file moves, deletions and other access events can help SMBs, and the MSPs that service them, protect sensitive data from theft, alteration and loss. Originally published by IS Decisions.
Read More
VNC Connect | Helping doctors improve patient care in difficult times
VNC Connect™ has always been a great partner to the healthcare industry. Doctors, nurses, other medical professionals and the IT support staff – all are using our technology on a daily basis. This article aims to show our audience how VNC Connect makes medical professionals' lives easier.
Read More
Prepare Your Online Store for the Holidays | Reflectiz
In recent years, client-side attacks gained popularity among threat actors. While most info-security systems today focus on the classical OWASP top 10 security threats, they protect the server while exposing the client-side attack surface.
Read More
Why Passwords Haven’t Disappeared Yet & What Organizations Should Do About It | Devolutions
News of yet another massive data breach breaks — and 81% of them are due to weak passwords. Because despite their faults, passwords are highly versatile. And in most organizations — and across virtually all small and midsize businesses (SMBs) — the infrastructure to support an entirely passwordless landscape does not exist.
Read More
Take Control of Your Data Security and SIEM Systems | Nagios
Within a SIEM system, you’re counting on software products and solutions to combine security information management and security event management. See how Nagios XI, Nagios Log Server, and Nagios Network Analyzer work together.
Read More
Here’s a New Free Tool to Discover Unprotected Cloud Storage Instances | ImmuniWeb
ImmuniWeb® new free cloud security test enables cybersecurity and IT professionals to identify unprotected cloud storage of their organizations in a simple and swift manner to prevent data leaks and security incidents.
Read More
The Top React Chart Library You Need To Know In 2021 | FusionCharts
Implementing user-friendly charts can be challenging. You don’t want to spend a lot of time creating the visualizations from scratch. React charting libraries can be a huge time-saver for you.
Read More
Build Your Next Software Installation in the Cloud | Revenera
Revenera’s InstallShield solution—the industry standard for developers creating software installers—has made the leap by introducing its Cloud License Server (CLS), enabling users to move their build infrastructure to the cloud.
Read More
Work From Home Challenges for IT Support Service Desk | FastPass
Overnight, all over the world, users are staying or working from home. This requires new devices and new software licenses – but what about support? Expect to see higher load, and tasks you can’t support as today. New tools are needed to get the support done. Originally published by FastPass.
Read More
How to Get the Most Out of Your Investment Analytics | FusionCharts
If you are looking to get the best out of your Investment Analytics, then Fusioncharts’ Investment Portfolio Dashboard is the ideal tool for you, where it contains a series of charts and analytical tools that help you budget your finances.
Read More
Remote Working & GDPR | TSFactory
Businesses must maintain higher standards of secure access and prioritize data protection practices as employees work remotely for the foreseeable future.Below are 4 tips to help your organization adhere to the GDPR while employees are working from home. Originally published by TSFactory.
Read More
Great Ways RealVNC can help IT professionals in education
Educational institutions are adopting a hybrid learning model that enables teachers and students to work from anywhere, addresses the different needs and encourages creative ways to learn. Furthermore, IT professionals and support staff within this industry can use VNC Connect software to make that possible.
Read More
LEAD Technologies Celebrates the Release of LEADTOOLS Version 22
LEAD Technologies is very pleased to introduce LEADTOOLS Version 22. LEADTOOLS has continued to raise the standard of innovative technologies for 31+ years and there is no end in sight. This release is highlighted by new libraries and features that are found within LEAD.
Read More
ImmuniWeb Named to 2021 AIFinTech100 List
Exciting News! ImmuniWeb is selected among 100 of the world’s most innovative AI solution providers for financial services industry that demonstrated outstanding innovation and growth.
Read More
Silobreaker presented with Frost & Sullivan’s 2021 Best Practices Enabling Technology Leadership Award in the global threat intelligence market
Silobreaker, a pioneer of building technology that makes sense of web data, has been awarded the Frost & Sullivan 2021 Enabling Technology Leadership Award for its visionary approach to the global threat intelligence market.
Read More
The future of education: Shifting to e-learning | RealVNC
E-learning has become the new normal causing management to create a new IT infrastructure. Remote access software can be an essential tool in your arsenal. In this article, we will take a deeper look at some great ways VNC Connect can improve your e-learning efforts. Originally published by RealVNC.
Read More
What is HTTP header injection? | Acunetix
HTTP header injection is a technique that can be used to facilitate malicious attacks such as cross-site scripting, web cache poisoning, and more. These, in turn, may lead to information disclosure, use of your application in phishing attacks, and other severe consequences.
Read More
Hybrid Cloud Storage Protection for MSPs | IS Decisions
Cyber threats such as ransomware, identity theft, and data exfiltration, which traditionally target on-premise resources are now a growing problem for cloud storage services. As companies continue to deploy resources to the cloud, the need to address these additional security challenges is a major concern.
Read More
The pitfalls of DIY application security | Netsparker
Many see web application security as a low-priority newcomer to the cybersecurity mix, leading to incomplete test coverage from a home-grown combination of point solutions. Let’s look at the pitfalls of piecemeal security testing and see how a DAST-based AppSec program is more effective on multiple levels.
Read More
Why integrating secure remote access into your product is essential | RealVNC
Secure remote access is a great add-on to your product. An embedded remote access technology will not only allow you to help your customers when they have problems but will also show them your commitment to continuously provide great service. Originally published by RealVNC.
Read More
New Updates on ImmuniWeb Discovery 2021
ImmuniWeb announces their new updates on ImmuniWeb Discovery. The improvements boost detection of cloud-native services in AWS, Azure, GCP and 30+ other public cloud service providers and expand Dark Web monitoring capacities.
Read More
InstallShield 2021 Now Released
Revenera announced the availability of InstallShield 2021. The leading solution for Microsoft Windows installations fully supports installations for Windows 11, which will launch later this year.
Read More
Integrating Acunetix with GitLab for CI/CD
HTTP header injection is a technique that can be used to facilitate malicious attacks such as cross-site scripting, web cache poisoning, and more. These, in turn, may lead to information disclosure, use of your application in phishing attacks, and other severe consequences.
Read More
Reflectiz Officially Receives ISO 27001 Certification
Reflectiz is now officially ISO/IEC 27001:2013 certified. This essentially means that the company is meeting one of the strictest Information Security Management requirements in the industry today. Originally published by Reflectiz.
Read More
The iPhone Upgrade: How to Back Up and Restore iOS Devices Without Losing Data
One of the main problems of iCloud forensics is the sporadic nature of cloud backups. Experts often find out that a given user either does not have device backups in their iCloud account at all. This happens primarily because of Apple’s policy of only granting 5GB of storage to the users of the free tier.
Read More
Does Your Organization Have a Strategy for Employee Departures?
The average worker will experience 12 job changes during their career. Millions of workers are planning on switching employers in the aftermath of the pandemic. This mass migration is not just a recruiting and retention risk. It is also a security threat.
Read More
What does End of Life mean for your Windows Server? | SeattleLab
In January 2020, Microsoft ended its support of Windows Server 2008. There will be no free security patches and updates. If you keep using Windows 7 and/or Windows Server 2008/R2, you will be at a huge risk of being exploited by cybercriminals if new vulnerabilities are disclosed. Originally published by SeattleLab.
Read More
[Use Case] How Organizations Can Use Devolutions Web Login to Autofill Website Credentials
Learn more on how organizations can use Devolutions Web Login to autofill website credentials. Research has found that the average business user must manually type out, or copy/paste, the credentials to 154 websites per month.
Read More
What to look for in a DAST solution | Netsparker
Choosing a DAST product that will work for your specific organization is crucial for your entire application security program. Read the highlights from the Invicti Web Application Security Buyer’s Guide and get the full guide to help you make an informed decision.
Read More
What is a digital nomad and how can VNC technology help?
The term ‘digital nomad’ has gained popularity in the last few years and a large number of people define themselves as such. Software such as VNC Connect have fuelled this transition as they allow easy access to resources via the internet. Originally published by RealVNC.
Read More
How to use VNC to remotely control a PC from your iPhone
VNC Viewer for iPhone makes it simple to control your Windows, Mac, or Linux machine straight from your iOS smartphone. The VNC Viewer iOS app couldn't be easier to set up and it will help you access your devices in a quick and easy way. Originally published by RealVNC.
Read More
Serious about web application security? Look both ways as you shift left
Shifting left has been a buzzword in the application security space for several years now. But in their drive to build security testing into development as early as possible, many organizations are neglecting application security in later phases and losing sight of the big picture.
Read More
Falcongaze SecureTower 6.5 – better control, stronger protection | Falcongaze
Falcongaze, a developer of data breach protection and personnel control software, has released the first of two planned updates to its SecureTower system this year.
Read More
Introduction to web cache poisoning | Netsparker
Content caching by web servers and content delivery networks has become a vital part of the modern web. While it speeds up content delivery and allows load balancing, web caching also brings its own security challenges and vulnerabilities. Here is what you need to know about web cache poisoning.
Read More
Do you have a web application security program or are you merely testing? | Netsparker
A systematic approach is vital to ensure web security in any sizable organization – and yet many companies still don’t have a web application security program. Especially with fast-moving DevOps workflows, ad-hoc security testing can never hope to keep up with web development at scale.
Read More
Addressing User Access in IT Security Compliance | IS Decisions
The risks of non-compliance are not worth taking. You face fines and even imprisonment — not to mention that non-compliance could lead to a serious data breach that might ultimately lose you clients and damage your reputation.
Read More
Understanding and preventing cross-site scripting vulnerabilities (XSS) | Netsparker
Cross-site scripting (XSS) vulnerabilities are among the most common web security issues and can lead to session hijacking, sensitive data exposure, and worse. This article explains the three types of XSS vulnerabilities and shows how you can detect and prevent them.
Read More
Password Obituary: But is the Humble Password Really Dead? | FastPassCorp
Password – you’re OK! Not OK like in perfect. Sure, you have your deficiencies and challenges, but you certainly have strengths and benefits too, which should kick that obituary out to a far-away future!
Read More
5 reasons why every MSSP needs a professional web application security solution | Acunetix
Here are the 5 primary reasons why MSSPs need to include web application security in their service portfolio and why a professional web application security solution like Acunetix is the best choice as the basis of such services.
Read More
Importance of Password Policy and Password Security Risks | FastPassCorp
It is importance that passwords and processes around passwords are secure. Modern self-service tools such as FastPass, on the other hand, offer technology that improves security and reduces the total cost of the password processes!
Read More
Understanding session fixation attacks | Netsparker
Session fixation attacks can allow the attacker to take over a victim’s session to steal confidential data, transfer funds, or completely take over a user account. Learn why session fixation is possible and how to prevent it.
Read More
Why DAST is the perfect fit for agile software projects | Netsparker
To deliver the full project scope on schedule and within budget is challenging enough. When you also have to make your application secure, things get really tough. This post shows how a modern DAST solution can help you build a secure SDLC to accomplish this.
Read More
Complete End-to-End Management and Security for Connected Devices | ArcusTeam & Lansweeper
Today’s networks are constantly expanding and evolving with the addition of new connected devices and a multitude of device types. But this increased complexity presents new challenges for managing the devices as well as protecting the organization from the new threats and vulnerabilities introduced by each and every device.
Read More
Is Your Business Ready for Windows 11? | Lansweeper
With Microsoft's release of Windows 11 just around the corner, IT teams in large enterprises are under pressure to devise a plan of attack. To roll out the new OS, they'll need a quick and cost-effective Windows 11 readiness check to identify machines that are eligible -- and ineligible -- for the upgrade.
Read More
6 Steps Guide: Reduce the risk of data breach in 2020 with Password Self Service | FastPassCorp
This guide is an ultimate source of inspiration to help your company achieve up to 90% end-user adoption rate with a set of specific steps and best practices built on years of expertise and engaging over 2 million end-users to the right self service of passwords tool.
Read More
Digital Security in the Travel and Tourism Industry | Reflectiz
The travel and tourism industry was reaching peak digitalization levels before COVID-19 struck in early 2020. The cybersecurity implication is simple – more travel and tourism targets for hackers and malicious entities. Let’s learn more about the risks involved and how to mitigate them.
Read More
How Lansweeper Can Help You Catch Cryptojackers | Lansweeper
Cryptocurrency market size is projected to grow to more than $1 billion by 2026. And while server farms and DIY home cryptocurrency mining is definitely still happening, there are ways of making just as much (if not more) profit without investing in infrastructure. And cybercriminals know it.
Read More
Introducing DOM Invader: DOM XSS just got a whole lot easier to find | Portswigger
Of the three main types of XSS, DOM-based XSS is by far the most difficult to find and exploit. But we come bearing good news! PortSwigger just released a new tool for Burp Suite Professional that's going to make testing for DOM XSS much easier. Meet: DOM Invader.
Read More
Silobreaker wins three Global Infosec Awards
Intelligence technology company Silobreaker is proud to announce it has been awarded the following awards from Cyber Defense Magazine (CDM), the industry’s leading electronic information security magazine.
Read More
What is SCA and why you need it | Acunetix
The security of your business depends not just on your code but on the entire supply chain. The more third-party components you use, the more likely it is that a vulnerability in your web application will be a result of third-party code, not your programming.
Read More
Are You Sitting on an Enterprise Device Security Time Bomb? | ArcusTeam
In this blog post, ArcusTeam discusses what we perceive as the main takeaways from this report and what we think enterprises need to focus on to secure networks and assets.
Read More
Why your VPN connections need two-factor authentication | IS Decisions
Businesses who have moved to the cloud for storage are finding it harder to detect unauthorized access to company files and folders. The ease of sharing data among teams and simple integrations their storage can have with other cloud applications significantly increases the prospect of unauthorized access.
Read More
VNC vs RDP: which remote desktop tool is the best? | RealVNC
Sometimes you need to retrieve work files and documents or quickly take control of a co-worker’s computer for ad-hoc support. Luckily, this is all possible using either RDP or VNC, so let’s break down the two methods so you can see their similarities and differences.
Read More
Why SSPR fails and what to do about it | FastPassCorp
Many self-service password reset solutions (SSPR) have very low user adoption rates, even close to 20 percent. This blog will help you understand the issues regarding most SSPR implementations and where to look for improvements.
Read More
DDoS-attack: what is it and how to prevent it | Falcongaze
If your server suddenly has a huge number of requests, they continue very often, and the server stopped reacting, then most likely it is a DDoS-attack. It is as if all grannies of the city decided to call one hospital of the city simultaneously.
Read More
India Privacy and Data Protection Bill | Reflectiz
To manage eCommerce websites and eService platforms at this current day, you have to make sure that personal data and information is secure at all times to stay compliant, regardless of where they are operating.
Read More
What is Vulnerability Management and Why Does Your Enterprise Need It? | ArcusTeam
Vulnerability management is crucial as its goal is to eliminate vulnerabilities that can open and enterprise’s networks up to attack. The process consists of a few critical steps that together, provide an enterprise with appropriate coverage from attack.
Read More
Protecting Active Directory logins for remote working | IS Decisions
Businesses who have moved to the cloud for storage are finding it harder to detect unauthorized access to company files and folders. The ease of sharing data among teams and simple integrations their storage can have with other cloud applications significantly increases the prospect of unauthorized access.
Read More
Security risks working from home | Holm Security
Working from home poses an increased challenge for IT departments, now required to offer flexible and secure solutions. This is a great challenge, not least because secure solutions are often more tedious for the end-user.
Read More
Spam: what kinds of it are there and how to understand that it is fraudulent? | Falcongaze
Fraudulent actors have a lot of methods to steal users’ information or make them wire money into their account. Spam is one of these methods. The Analytical department of Falcongaze did its best to tell about the most widely known traits that can tell that a message is malicious and its sender is a fraudulent actor.
Read More
How Remote Access can support more flexibility for Law Firms | RealVNC
The sudden shift of remote working brought specific challenges to law firms. Client meetings and court dates were all suddenly remote, and firms had to figure out how to securely conduct business from home while being mindful of operating within the industry’s strict regulations.
Read More
Top 5 Connected Device Security Challenges that CISOs are Facing | ArcusTeam
CISOs across industries are faced with five major challenges, as they scramble to secure connected devices
Read More
Why SMBs believe their data is unsafe in the cloud | IS Decisions
Businesses who have moved to the cloud for storage are finding it harder to detect unauthorized access to company files and folders. The ease of sharing data among teams and simple integrations their storage can have with other cloud applications significantly increases the prospect of unauthorized access.
Read More
New Feature: An Advanced Tool for Domain Security for your Website | Reflectiz
The new and advanced Domain Security feature from Reflectiz allows you to scan your website ecosystem on an ongoing basis to eliminate all redundant remote domain dependencies and to detect internal domains that may be unsafe.
Read More
How to Search Billions of Logs Without learning New Script Language With SureLog SIEM?
ANET is a SIEM pioneer with clients throughout the world experiencing the ANET difference. SIEM. But different. SureLog is a solution that allows you to build your own search logic without a new script language.
Read More
Device Vulnerability and Threat Management Solutions | ArcusTeam
Network scanning is basically the mapping of all active devices on a network. This is done by sending a ping to each device and waiting to get a response. Cyber threat detection is conducted by reviewing the responses to see if there are inconsistencies that could point to a threat.
Read More
Zero-Day Vulnerability Exploits 101: A Glossary | ArcusTeam
A zero-day (0day) vulnerability is an existing vulnerability in software or hardware that can become a pathway for hackers to weaponize and exploit.
Read More
What is Vishing? | FastPassCorp
Vishing or Vishing Attack is when a criminal impersonates a victim to get sensitive data resulting to identity theft or data breach. As part of security awareness, we discuss the different types of Vishing. See below.
Read More
How to Avoid Weak Passwords in Active Directory | FastPassCorp
Weak or stolen passwords are involved in more than 80% of data breaches according to Verizon DBIR. This poses a risk and is a common concern among CISOs (Chief Information Security Officer), IT Security Managers & Compliance Team.
Read More
Your CMDB Is a Valuable Tool – but Only If You Can Trust It | Lansweeper
Your CMDB can provide the foundation for IT service management (ITSM) and be a valuable tool for assisting with operations, software asset management, cybersecurity initiatives and compliance audits - but only if it's complete, accurate and up to date.
Read More
Cyber Security Challenges in the Medical Field | Holm Security
Most healthcare organizations are aware of the importance of having an effective cyber security strategy. However, manually checking thousands of systems for vulnerabilities turned out to be ineffective and time-consuming.
Read More
Invicti recognized on the 2021 Gartner Magic Quadrant for Application Security Testing | Acunetix
We are thrilled for Invicti to be recognized for the first time in the Magic Quadrant for Application Security Testing this year.
Read More
Understanding the “After Ransomware” helps MSPs protect against it | IS Decisions
Advertisements might seem like something that poses no risks to your organization. However, having an ad blocker has more utility in your organization than you might think.
Read More
Preventing Malvertising in your Organization | Lansweeper
Advertisements might seem like something that poses no risks to your organization. However, having an ad blocker has more utility in your organization than you might think.
Read More
5 Major Benefits of Early Security Testing | Acunetix
It is no secret that early security testing is beneficial. However, do you know how advantageous it is and what are the potential consequences of the lack of early testing? Continue reading Acunetix's article to discover the 5 top benefits of early security testing along with the risks of late testing.
Read More
4 fantastic remote access business benefits you should know about | RealVNC
RealVNC shared use cases for better understand of the benefits of remote access and its ease of use within their institutions.
Read More
How to avoid web supply chain attacks | Acunetix
Does your business use any third-party web applications? If so, how can you be certain that you are not going to become a victim of a supply chain attack?
Read More
ImmuniWeb® AI Platform Major Update Q2 2021
After successfully passing our annual ISO 27001 audit by SGS, with 0 minor and 0 major non-conformities, ImmuniWeb is delighted to present new features and improvements of the ImmuniWeb® AI Platform for Q2 2021.
Read More
All You Need to Know About Web Skimming Attacks | Reflectiz
Web skimming, also known as digital skimming, is a hacking technique that targets digital businesses by manipulating unmonitored and compromised client side web applications.
Read More
Benefits of Web Asset Discovery | Acunetix
The latest release of Acunetix introduces web asset discovery. This allows you to decide if these assets need to be covered by your web application security processes.
Read More
How to Spot and Stop Malware | ANET
Organizations still get hit with malware and ransomware in spite of that fact that antivirus and firewall solutions are in place. We will show you how SureLog SIEM can effectively identify and stop malware on the network.
Read More
Reflectiz | Top 2020 Cybersecurity Events: Key Takeaways for 2021
This FREE eBook from Reflectiz will help you understand how third-party application security can help make digital business safe again.
Read More
Diagnose, Prevent and Fix Hardware Failure | Lansweeper
Hardware failures are one of the few unexpected occurrences that can have a major impact on an organization, critical systems being down or users not being able to perform their tasks can cost the business.
Read More
Why Intrusion Testing? | Holm Security
Intrusion testing for IT systems is also sometimes called pentesting, security testing, or penetration testing. The purpose behind it is to scan the system for vulnerabilities, such as security holes, open ports, and other issues with the security of the network or system.
Read More
Reflectiz Wins Prestigious Cyber Defense Magazine Awards
Reflectiz, the emerging Israeli cybersecurity startup, receives “Next-Gen in Digital Footprint Security” and ” Most Promising in Web Application Security” accolades.
Read More
Ad-hoc scanning is not enough | Acunetix
With a major increase in the complexity and availability of web technologies, the ad-hoc model became outdated and does not meet the security needs of most businesses today.
Read More
How to control your employees? | Falcongaze
When employers care for their business, they want their employees to be effective. It is important for them that in working hours employees do their job and not play games, chat with friends, or read articles not relating to work.
Read More
Working from Home: Tips to Secure Your Remote Workforce | Lansweeper
Amid this giant wave of disruption, one thing has unfortunately remained the same: the willingness of cybercriminals to exploit society's misfortune to obstruct business, deceive users and steal proprietary data.
Read More
5 Steps to Successful Vulnerability Management | Holm Security
Vulnerability Management is a cornerstone in a modern cyber security defense. But getting started and implementing a successful security strategy for Vulnerability Management can be challenging. Here is our checklist to help you become successful.
Read More
Why Security Monitoring? | Holm Security
Security monitoring is beginning to change in the field of Information Technology. Companies can now see more about the activity on their networks than they ever have before.
Read More
ImmuniWeb 5 Common Web Security Mistakes That Cost Millions
Your web application security is a big deal. With the rise of AI for application security testing, some fundamental problems continue causing the most devastating data breaches. In the article, ImmuniWeb shared the 5 common web security mistakes that cost many businesses millions.
Read More
AdminStudio 2021 Now Released!
Flexera has just announced the new release of AdminStudio 2021! With the new release, you can easily integrate into your existing package request workflows.
Read More
How ITAM 2.0 Enables Big Opportunities For IT Cost Optimization | Lansweeper
Covid-19's unprecedented global economic impact has forced CIOs to find innovative ways to manage and control costs, all while supporting organizational goals for digital transformation.
Read More
How to use FastCube .NET in Vue SPA application | Fast Reports
The Vue.js framework is currently very popular and stands in line with Angular. Learn how to implement the display of a FastReport web report in a single-page application on Vue.js with backend on ASP .NET Core.
Read More
SSL/TLS-certificate: what is it, how does it work, and how to learn if a web-site has it? | Falcongaze
The Analytical department of Falcongaze often writes about privacy policies and security measures of different apps and services. How does the certificate work, and how to understand that a web-site has it – we tried to answer these questions.
Read More
Simplified cloud deployment for Burp Suite Enterprise Edition | Portswigger
Since the initial launch of Portswigger cloud-friendly solution, we have been working on a number of cloud deployment enhancements. The improvements in Portswigger latest 2021.3.1 release will support faster, more efficient setup.
Read More
Keeping your Remote Workers (digitally) Secure | RealVNC
It’s important to arm yourself and your staff with the right tools and know-how to keep confidential company information safe, wherever you are. There’s an abundance of tools and tips available specifically for remote workers, but RealVNC will just cover the essentials to get you started.
Read More
Simplified cloud deployment for Burp Suite Enterprise Edition | Portswigger
Burp Suite Enterprise Edition was designed to support your DevSecOps needs. One of the ways it does this is via Portswigger's pre-built and generic CI/CD driver. Portswigger had a focus on reducing the technical complexity involved when integrating Burp Suite Enterprise Edition with CI/CD pipelines.
Read More
How remote desktop helps schools deliver outstanding online education | RealVNC
RealVNC shared use cases for better understand of the benefits of remote access and its ease of use within their institutions.
Read More
How to Set Up a Remote Working Policy | RealVNC
RealVNC will take you on a whistle-stop tour of the most important things to consider when setting up a remote working policy for your business.
Read More
InstallAnywhere 2021 Now Released
The new version of InstallAnywhere 2021 is now available for download.
Read More
8 Remote Working Tips | RealVNC
The ongoing COVID-19 pandemic means that there is no opting-out from telecommuting, and offices around the world are having to quickly adjust to working from home indefinitely. RealVNC collected a few useful remote working tips for its WFH community.
Read More
Who to entrust your e-mails with: security measures of popular e-mail services | Falcongaze
The most popular e-mail services provide users with good functionality. What about security measures? How Gmail, Microsoft Outlook, Zoho, and Yahoo! Mail store users’ data? Falcongaze has analyzed their security measures and reputation.
Read More
API Scanning with Burp Suite | Portswigger
Both Burp Suite Professional and Burp Suite Enterprise Edition contain Burp Scanner - allowing users to easily scan web applications for vulnerabilities. In this post we discuss how the crawler was adapted to work with API endpoints rather than web pages.
Read More
7 Burp Suite Professional-exclusive features to help you test smarter | Portswigger
Portswigger put together a list of power features we recommend checking out. All of these are exclusive to Burp Suite Professional - and they're a big part of the reason so many users (52,000 and counting) subscribe to it.
Read More
How to learn more about an employee using DLP-system? | Falcongaze
Employees are the main asset of a company. Their working results influence everything: company’s income, reputation, privacy of stored data. That is why an employer has to understand what kind of person an employee is and what to expect from them.
Read More
How to programmatically set the default email client settings for sending emails from FastReport.NET
Like many other report generators, FastReport .NET allows you to send a report via email in any of the available export formats. You can send an e-mail either in the report preview mode or in the custom application code.
Read More
Detecting Unusual Activities Using SureLog Next Generation SIEM | ANET
Next-Gen SIEM Platform can help organizations detect and respond to threats faster than ever before. The biggest advantage of Next-Gen SIEMs is security analytics. Security analytics use cases generally fall into three broad categories.
Read More
Reflectiz | Content Security Policy (CSP): Not Exactly a Magecart Vaccine
It is important for eCommerce websites and online businesses to combat Magecart and web-skimming issues proactively and relentlessly. Reflectiz takes a deep dive into the matter, whether the proven and tested Content Security Policy (CSP) can get the job done.
Read More
InstallShield 2020 R3 Now Available
InstallShield is the fastest, easiest way to build Windows installers and MSIX packages, and today we announce InstallShield 2020 enhancements.
Read More
Sign up for the 30-day Free Trial for Deep Freeze | Enforcing Social Distancing in Labs with Deep Freeze
Sign up for the 30-day Free Trial for Deep Freeze
Read More
Customers’ Choice in 2020 Gartner Peer Insights
The Acunetix team is excited to announce that we have been recognized as an October 2020 Gartner Peer Insights Customers’ Choice for Application Security Testing.
Read More
Reflectiz | The Coronavirus Impacts on Cybersecurity
This new era presents increased third-party risks, especially when everything we do becomes web-based and demonstrates higher online dependency. These are troubling security challenges, but there are effective solutions that already protect against these risks.
Read More
New Releases of SLNet now live – Version 6.2/6.3
SeattleLab is now announcing their launch of its latest release of SLNet, the global leader in Telnet Server solutions for Windows. SeattleLab's product enables you to seamlessly connect a range of handheld terminals to Windows applications.
Read More
Why SureLog is the Right SIEM Solution for you
The right SIEM tool varies based on a business’ security posture, its budget and other factors. However, the top SIEM tools, such as ANET SureLog, usually offer the following capabilities.
Read More
Reflectiz | The Gocgle Malicious Campaign
A new web skimming campaign is impersonating Google web products in order to collect sensitive information from users on eCommerce websites. Reflectiz research team has been investigating a new web-skimming type campaign targeting e-commerce websites.
Read More
Reflectiz Version 2.8 live now
Almost any organization today uses dozens of websites and subdomains. Each provides essential functions and uses dozens of third-party apps and tags to produce its capabilities.
Read More
InstallShield 2020 R2 Now Available
InstallShield 2020 R2 is now available. Customers can download the release at no additional cost under the terms of their active InstallShield maintenance plan.
Read More
Acunetix now introduces Chinese Language Support in the UI
Acunetix update introduces Chinese language support in the UI, allowing Chinese users of Acunetix to browse the Acunetix UI and read vulnerability data in their language.
Read More
Introducing Installshield 2020 !
LOGON has been a Flexera partner for over 10 years. We understand Installation technology. And we are proud to announce availability of InstallShield 2020.
Read More
Acunetix | Are you safe from your web vulnerabilities?
Recently, Sophos, one of the world’s most renowned security companies, found an SQL Injection in their product. What is worse, they found the vulnerability because malicious hackers have been using it to attack their clients.
Read More
Introducing Acunetix Version 13 !
Acunetix is now fully integrated with a network scanner. You can verify the security of your web applications and web servers at the same time.
Read More
Acunetix version 12 is now released!
Acunetix's new build introduces a new scanning algorithm that removes redundant scanning tasks. In addition, the scanning tasks are prioritized in a way that gives dissimilar locations higher scanning priority, improving the time to detect dissimilar vulnerabilities.
Read More
InstallAnywhere 2020 now Available !
With the newly released InstallAnywhere 2020, it adapts seamlessly to industry changes, helping you get to market faster to deliver an engaging customer experience.
Read More
Flexera Launches Package Feed Module for AdminStudio
The Package Feed Module provides integrated downloading along with valuable details for thousands of application installers.
Read More
New version of FastReport .Net 2019.3 hot from the oven.
With FastReport.Net, you can create application-independent .Net reports. In other words, FastReport.Net can be used as a standalone reporting tool.
Read More
What’s new in FileAudit 6 ? Now monitor files on the Cloud !
Traditionally, FileAudit monitored files and folders on Windows Active Directory-based servers, but with the release of Version 6.0, IS Decisions has extended FileAudit’s monitoring capabilities to major cloud file storage providers.
Read More
Announcing InstallShield 2019 !
InstallShield 2019, Build Native MSIX Packages and Easily Convert MSI files
Read More