Attack Campaign Using Fake Browser Updates to Deliver Ransomware and Banking Malware

Researchers observed an attack campaign distributing fake browser updates to infect website visitors with ransomware and banking malware. Sucuri reported that the attackers inject either links to an external script or the entire script code into a compromised webpage. In both cases, this code creates a message box informing the user that a critical error resulted from an outdated version of …

Private, Public, Hybrid, or Multi-Cloud: What’s the Difference Between Them?

No two clouds are exactly alike. That being said, many clouds are very similar and essentially have the same functionality. The difference lies in the way they’re used by each individual business. Every company has different cloud needs and, therefore, will build or alter their cloud technology to work for whatever those needs are. Here’s where different types of cloud environments come in. There are four …

EMAIL SECURITY

Finally – A Complete Email Protection Plan

Email Protection Complete Email Protection Requires a Layered Defense Between 75% and 90% of targeted cyber-attacks start with an email. Email-borne attacks interrupt business operations, cause financial damage, and compromise business integrity. Barracuda protects you by extending traditional email security with a multi-faceted approach that protects all aspects of your email infrastructure. Gateway Defense Layer Stop Advanced Threats Before They …

Microsoft Office 365 outage?

Ensure business continuity during downtime Yesterday, Office 365 experienced a significant outage for more than a day across Europe, leaving customers unable to log in to Exchange Online to read, respond, send, or receive new emails. This isn’t the first time that Microsoft has experienced outages. Just a few months ago, in November 2018, Office 365 users experienced issues trying to log …

Backup and Recovery

Firewall Security Solutions

Any business with an internet and intranet that allows its employees access to the Internet and corporate resources, implement firewall security solutions to prevent outsiders from accessing its own private data resources and for controlling what outside resources its own users have access to. For ideal network security, a firewall is often installed in a specially designated computer separate from …