Tag Archives: Cybersecurity

QualTech Critical Infrastructure Services

QualTech360Care Endpoint Security with Sophos When it comes to cloud managed services QualTech goes beyond just making available virtual infrastructure such as single tenant isolated virtual networks and vms running Linux or Windows 2012 OS. Our multiple data center redundant cloud infrastructure hosted in ISO 27000 certified data centers gives you scalable and compliant infrastructure you can trust but… Read More »

Indicators Associated With WannaCry Ransomware

Indicators Associated With WannaCry Ransomware Source: Homeland Security Original release date: May 12, 2017 | Last revised: May 13, 2017 Systems Affected Microsoft Windows operating systems Overview According to numerous open-source reports, a widespread ransomware campaign is affecting various organizations with reports of tens of thousands of infections in as many as 74 countries, including the United States,… Read More »

Microsoft EMET – Time For an Upgrade

Source: NeworkWorld Hackers can easily disable the Microsoft Enhanced Mitigation Experience Toolkit (EMET), a free tool used by companies to strengthen their Windows computers and applications against publicly known and unknown software exploits. Researchers from security vendor FireEye have found a method through which exploits can unload EMET-enforced protections by leveraging a legitimate function in the tool itself.… Read More »

New remote access Trojan Trochilus used in cyberespionage operations

Source: NetworkWorld A cyberespionage group has been discovered using a new remote access Trojan, dubbed Trochilus, whose detection rate was very low among antivirus products.  The malware was discovered by researchers from Arbor Networks while investigating attacks in Myanmar that were launched from compromised government websites. The researchers linked the compromises to a sophisticated group of attackers known… Read More »

Millions of embedded devices use the same hard-coded SSH and TLS private keys

Resource: NetworkWorld Thousands of routers, modems, IP cameras, VoIP phones and other embedded devices share the same hard-coded SSH (Secure Shell) host keys or HTTPS (HTTP Secure) server certificates, a study found. By extracting those keys, hackers can potentially launch man-in-the-middle attacks to intercept and decrypt traffic between users and millions of devices. more… Drop us a comment… Read More »