News & Events
News, Views & Events
Latest News & Our Event in Maldives, Product Updates, Technology Updates, Online Training, and many more. Also, we encourage you to follow us on Social Media to get news in flash.
July‘s Most Wanted Malware: Emotet Strikes Again After Five-Month Absence
Check Point Research finds sharp increase in the Emotet botnet spreading spam campaigns after period of inactivity, aiming to steal banking credentials and spread inside targeted networks
Our latest Global Threat Index for July 2020 has revealed that after a five-month absence, Emotet has surged back to 1st place in the Index, impacting 5% of organizations globally.
Since February 2020, Emotet’s activities – primarily sending waves of malspam campaigns – started to slow down and eventually stopped, until re-emerging in July. This pattern was observed in 2019 when the Emotet botnet ceased activity during the summer months but resumed in September.
In July, Emotet was spreading malspam campaigns, infecting its victims with TrickBot and Qbot, which are used to steal banking credentials and spread inside networks. Some of the malspam campaigns contained malicious doc file with names like “form.doc” or “invoice.doc”. According to researchers, the malicious document launches a PowerShell to pull the Emotet binary from remote websites and infect machines, adding them to the botnet. The resumption of Emotet’s activities highlights the scale and power of the botnet globally.
It is interesting that Emotet was dormant for several months earlier this year, repeating a pattern Check Point first observed in 2019. Check Point researchers assume that the developers behind the botnet were updating its features and capabilities. But as it is active again, organizations should educate employees about how to identify the types of malspam that carry these threats and warn about the risks of opening email attachments or clicking on links from external sources. Businesses should also look at deploying anti-malware solutions that can prevent such content reaching end-users.
The research team also warns that “MVPower DVR Remote Code Execution” is the most common exploited vulnerability, impacting 44% of organizations globally, followed by “OpenSSL TLS DTLS Heartbeat Information Disclosure” which impacts 42% of organizations worldwide. “Command Injection Over HTTP Payload” is in third place, with a global impact of 38%.
Synology Drive leads a new-era of file collaboration
Surpassing Cloud Station in every way imaginable
Reflecting our core belief that data should be accessible anywhere, Cloud Station offers a private cloud solution allowing you to instantly sync files across multiple platforms while retaining historical versions of important files for recovery purposes. Having served over 1.6 million offices and families since its debut 6 years ago, Cloud Station developed many advanced features to adapt to users’ various needs, allowing you to seamlessly access and sync files across NAS servers, PCs, and mobile devices.
Mobile Adware : the silent plague with no Origin
According to Check Point Software, 27% of companies worldwide have suffered attacks on their mobile devices, showing a clear upward trend of sixth generation attacks
We are witnessing a plague of mobile adware, one of the most common forms of cyber-threats designed to collect personal information from a user’s device. Roughly 4 billion people1are connected to the internet via their smartphone, yet companies rarely prioritize mobile security. Check Point’s Cyber Security Report 2020 shows that in 2019, 27% of companies suffered a cyber-attack because the security of a mobile device was breached.
“It only takes one compromised mobile device for cybercriminals to steal confidential information and access an organizations corporate network,” explains Yael Macias, Product Marketing Manager from Check Point. “More and more mobile threats are created each day, with higher levels of sophistication and larger success rates. Mobile adware, a form of malware designed to display unwanted advertisements on a user’s screen, is utilized by cybercriminals to execute sixth-generation cyber-attacks.”
Commvault Continues To Stand Out With Data Breakthrough Award Win
The Systems Workshop (TSW) CIO FORUM 2019 was held in Adaaran Hudhuran Fushi Resort on 27th & 28th July. The Event was inaugurated by Hon. Minister Communication & Technology Maleeh Jamal. The Idea behind the TSW CIO Forum is to create an idea sharing platform for Maldives IT community. Forum will be the medium to disseminate the latest technology enhancements in the field, IT Best Practices, Training and last but not least to create wide network among the community.
Five worthy reads: How should your business approach multi-cloud adoption?
Five worthy reads is a regular column on five noteworthy items we’ve discovered while researching trending and timeless topics. In this edition, we’ll learn about the multi-cloud strategy, why you should consider it and how to implement it in your organization.
HOW DO WE ENSURE SAFETY IN THE NEXT GENERATION OF OT NETWORKS?
Have you ever been driving along, pulled up to a stop light, and wondered why that stop light was put there in the first place? Or wondered about all other rules we follow on the road, like obeying yield signs or the single and double yellow lines on the road?
COMMVAULT RECOGNIZED AS A 2020 GARTNER PEER INSIGHTS CUSTOMERS’ CHOICE FOR DATA CENTER BACKUP AND RECOVERY SOLUTIONS
Tinton Falls, N.J. – February 24, 2020 – Commvault (NASDAQ: CVLT), a recognized global enterprise software leader in the management of data across cloud and on-premises environments, is excited to share that, for the third time in a row, Commvault was named a Gartner Peer Insights Customers’ Choice for Data Center Backup and Recovery Solutions.
Commvault for Microsoft Office 365 Backup and Recovery
Introducing Unified Controller Synology UC3200
Forcepoint Minute Ep. 1 – Email Phishing
Kaspersky Safe Kids Parental Portal Tour
CrowdStrike Falcon: The Breach Prevention Platform
Whiteboard Thinking Barracuda ADC
for more Insightful Videos