dcsimg

Date Formatting in Python

There are many different types of objects that we can work with in Python. Dates are one of those objects that are infamous in nearly every language. Date types are notoriously hard to wrangle but Python has quite a few ways to manipulate dates and time. … [Read more...]

Avzhan DDoS bot dropped by Chinese drive-by attack

The Avzhan DDoS bot has been known since 2010, but recently we saw it in wild again, being dropped by a Chinese drive-by attack. In this post, we’ll take a deep dive into its functionality and compare the sample we captured with the one described in the past. Analyzed sample 05749f08ebd9762511c6da92481e87d8 – The main sample, dropped by the exploit … [Read more...]

Deepfakes FakeApp tool (briefly) includes cryptominer

A few weeks ago, we took a look at a forum dedicated to Deepfake clips where the site was pushing Coinhive mining scripts in the website’s HTML code. As it turns out, there’s been another mining blow-out in the form of one of the apps used to make the fakes. That’s right—a tool designed to push CPU/GPU hard in order to create movie files also wanted you to push the GPU that much … [Read more...]

GDPR goes live in 3 months. Are you ready?

Is it possible that some organizations have not yet heard about GDPR - the new EU legislation? Sadly, yes. And an even greater number who have heard about it don’t realise how their own organization will be impacted. … [Read more...]

Understanding Today’s Most Successful MSP Programs

In her recent webinar for the “MSP Business Bootcamp,” Stefanie Hammond, senior channel sales specialist at SolarWinds MSP, guided viewers through the various types of MSP packages we have seen successfully implemented in the marketplace as well as taking an in-depth look at the feature-sets typically included at each level.   Read More … [Read more...]

Using Change Auditing for an Effective Incident Response Plan

All enterprises should have an incident response plan in place to help minimize the damage caused by a cyber-attack. The plan should enable enterprises to recover in the shortest time possible, with the least amount of money spent, and damage caused to their reputation. The plan should include a list of processes that should be executed in the event of a breach and should also provide a clear … [Read more...]

Physical appearance and the GDPR

After our recent discussion on personal data under the EU General Data Protection Regulation (GPDR), many people seemed surprised by the extent to which someone’s physical appearance is considered personal data. The GDPR defines personal data as “any information relating to an identified or identifiable natural person (‘data subject’)”. In other words, any information that is clearly about a … [Read more...]

An easier way to get distribution group usage metrics for Office 365

Those of you who use Exchange Online have probably regularly wondered – and have been asked many times- if all distribution lists were still in use. A... Continue reading … [Read more...]

Legaltech 2018: Choosing Your Most Vital Records When Recovering From a Disaster?

“All animals are equal, but some animals are more equal than others.” —George Orwell, Animal FarmWith the above quote from George Orwell’s Animal Farm, BlackRock director Jason Stearns set the tone at a 2018 Legaltech panel discussion on the role of records management in disaster recovery (DR) planning. Every organization has records it needs to conduct business, but not all content has the … [Read more...]

Container security tools abound, but IT pros await big vendors

ServiceMaster's decision to deploy Tenable.io Container Security is highlighted in TechTarget. http://searchitoperations.techtarget.com/news/252435533/Container-security-tools... … [Read more...]