Data Center

Server consolidation benefits, types and considerations | TechTarget

IT administrators who combine virtualization with a server consolidation plan can improve server utilization and reduce data center power consumption and hardware costs. A server consolidation plan can include one of two consolidation methods: migrating workloads to a server’s OS or using virtualization to run applications inside of VMs. Virtualization is often the preferred choice […]

Cybersecurity

Threat actors leverage document publishing sites for ongoing credential and session token theft

Cisco Talos Incident Response (Talos IR) has observed the ongoing use of legitimate digital document publishing (DDP) sites for phishing, credential theft and session token theft during recent incident response and threat intelligence engagements. Hosting phishing lures on DDP sites increases the likelihood of a successful phishing attack, since these sites often have a favorable […]

Cybersecurity

White House meets with UnitedHealth, industry groups on Change Healthcare cyberattack fallout

Dive Brief: Officials from the White House and the U.S. Department of Health and Human Services held a meeting on Tuesday with UnitedHealth and other industry groups to discuss the cyberattack at Change Healthcare, which has disrupted the healthcare sector for three weeks.  HHS Secretary Xavier Becerra and White House Domestic Policy Advisor Neera Tanden […]

Cybersecurity

JetBrains vulnerability exploitation highlights debate over ‘silent patching’

Czech software giant JetBrains harshly criticized security company Rapid7 this week following a dispute over two recently-discovered vulnerabilities. In a blog post published Monday, JetBrains attributed the compromise of several customers’ servers to Rapid7’s decision to release detailed information on the vulnerabilities. “After the full disclosure was made, we started hearing from some customers who […]

Cybersecurity

The effects of law enforcement takedowns on the ransomware landscape – Help Net Security

While the results of law enforcement action against ransomware-as-a-service operators Alphv/BlackCat and LockBit are yet to be fully realized, the August 2023 disruption of the Qakbot botnet has had one notable effect: ransomware affiliates have switched to vulnerability exploitation as the primary method of delivering the malware. The switch is obvious to Symantec’s Threat Hunter […]

Cybersecurity

Chinese Cybercrime: Discretion Is the Better Part of Valor

Cybercrime , Fraud Management & Cybercrime Repeat Crackdowns Drive Criminals to Embrace Foreign-Made Encrypted Messaging Apps Mathew J. Schwartz (euroinfosec) • March 13, 2024     Chinese criminals prefer not to draw the state’s attention. (Image: Shutterstock) Think “Chinese hackers” and most likely Beijing’s many state espionage threat actors come to mind. Partly, says cybersecurity […]