This Week in Technology

This Week in Technology

By Eric Corcoran
Posted in Technology Week in Review
On August 23, 2024

Monday 8/19

Unmasking Styx Stealer: How a Hacker’s Slip Led to an Intelligence Treasure Trove and their Big Reveal (Check Point)

During the debugging of Styx Stealer, the developer made a fatal error and leaked data from his computer, which allowed CPR to obtain a large amount of intelligence, including the number of clients, profit information, nicknames, phone numbers, and email addresses, as well as similar data about the actor behind the Agent Tesla campaign.

https://blog.checkpoint.com/research/unmasking-styx-stealer-how-a-hackers-slip-led-to-an-intelligence-treasure-trove-and-their-big-reveal/

Strategies for performing security migrations (Wiz)

Security teams often get involved with a type of larger scale migration project where there isn’t a clear CVE; here is some advice, given that these projects can be harder to prioritize and get across the finish line.

https://www.wiz.io/blog/cloud-security-migrations-best-practices

Tuesday 8/20

Identity Protection That Spans the Entire Attack Lifecycle (Palo Alto Networks)

With work no longer limited to the office and employees working from anywhere, coupled with accelerated digital transformation, this has led to an expanded attack surface and heightened cybersecurity risks. Today, a single compromised credential or a malicious insider can spell disaster for even the most robust enterprises.

https://www.paloaltonetworks.com/blog/2024/08/identity-protection-that-spans-the-entire-attack-lifecycle/

Simplify virtual desktop delivery with Citrix DaaS for Amazon WorkSpaces Core (Citrix)

Citrix DaaS for Amazon WorkSpaces Core provides a powerful and cost-effective solution, with flexible pricing options, support for Microsoft 365 apps for enterprise, and new Windows Server and encrypted disk support.

https://www.citrix.com/blogs/2024/08/19/simplify-virtual-desktop-delivery-with-citrix-daas-for-amazon-workspaces-core/

Wednesday 8/21

Operationalizing Data Security Posture Management (Rubrik)

To get the most value out of the system we need to offer an easy path to adoption if we want to crossover from theoretical security concepts into practical, day-to-day operations that protect against cyber threats.

https://www.rubrik.com/blog/technology/24/8/operationalizing-data-security-posture-management

Rethinking Priorities: It’s Time to Modernize Data Protection (Pure Storage)

For the past 25 years, most IT orgs have been focused on backups, but things have changed. Now, recovery matters more than ever. It’s time for modern data protection.

https://blog.purestorage.com/perspectives/rethinking-priorities-its-time-to-modernize-data-protection/

Thursday 8/22

What is Endpoint Security? (Arctic Wolf)

Endpoints are a continuous target for threat actors. They serve as gateways to the overall network, meaning an attack that starts on a single endpoint can quickly spread across the attack surface. They offer a valuable entry point into an organization’s environment that can be used to launch sophisticated cyber attacks.

https://arcticwolf.com/resources/blog/what-are-endpoints/

Zero Standing Privileges: The Essentials (CyberArk)

Zero Standing Privileges (ZSP) is a security principle that advocates removing all persistent user privileges within an enterprise’s estate. In short, access is provisioned just-in-time (JIT) with ZSP, meaning every identity not in use has no entitlements until required by a user and authorized by a policy or automation.

https://www.cyberark.com/resources/blog/zero-standing-privileges-the-essentials

Friday 8/23

6 Tips for Navigating the Journey to Cloud VDI/DaaS (Nerdio)

A cloud VDI/DaaS transformation requires careful planning and strategic decision-making. There are critical steps to take when considering a cloud migration to ensure a smooth transition, mitigate risk, and set your organization up for long-term success. 

https://getnerdio.com/resources/6-tips-for-navigating-the-journey-to-cloud-vdi-daas/

What is Data Exfiltration? (Code42)

Data exfiltration can occur through accidental leakage by employees or through malicious insiders who intentionally leak data to unsafe locations. Alarmingly, since 2021, there has been a 28% increase in the average number of monthly insider-driven data exposure, loss, leak, and theft events.

https://www.code42.com/blog/what-is-data-exfiltration/