This Week in Technology

This Week in Technology

By Eric Corcoran
Posted in Technology Week in Review
On February 21, 2025

Monday 2/17

The Role of Runtime Security in Cloud Environments (Wiz)

As cloud adoption accelerates, security teams must protect dynamic, cloud-native environments that include containers, serverless functions, and virtual machines (VMs). Runtime cloud security refers to the continuous monitoring and protection of workloads while they are actively running in production environments. 

https://www.wiz.io/blog/the-role-of-runtime-security-in-cloud-environments

Why Data Tiering is Critical for Modern Security and Observability Teams (Cribl)

As organizations generate more data than ever before, the traditional approach of storing everything in high-performance, expensive systems is becoming unsustainable. How will your team evolve how it manages and uses telemetry data across the enterprise?

https://cribl.io/blog/why-data-tiering-is-critical-for-modern-security-and-observability-teams/

Tuesday 2/18

Building a Virtualized and Networked Cloud of Data with Pure Fusion (Pure Storage)

In today’s fast-moving, data-driven world, legacy storage is a bottleneck, slowing innovation and driving inefficiencies. Learn how Pure Fusion redefines how your data is managed.

https://blog.purestorage.com/products/building-a-virtualized-and-networked-cloud-of-storage-with-pure-fusion/

Wednesday 2/19

MSIX App Attach – Why Not?

With Windows 10 reaching end of life in October, new opportunities emerge, such as trying MSIX app attach for application delivery. MSIX app attach is a Microsoft packaging technology used to deliver apps to virtual desktops and sessions without requiring you to install the app itself.

https://www.gothamtg.com/blog/msix-app-attach-why-not

An Update on Fake Updates: Two New Actors, and New Mac Malware (Proofpoint)

The activity detailed in this report can be hard for security teams to detect and prevent and may present difficulties with communicating the threat to end users due to the social engineering techniques and website compromises used by the threat actor. The best mitigation is defense in depth.

https://www.proofpoint.com/us/blog/threat-insight/update-fake-updates-two-new-actors-and-new-mac-malware

That Word Document Isn’t Broken—It’s a Phishing Attack in Disguise (Abnormal Security)

Attackers exploit Microsoft Word’s file recovery to evade detection, using corrupted docs for QR code phishing. Learn how this tactic bypasses legacy security.

https://abnormalsecurity.com/blog/corrupted-word-document-qr-code-phishing-attack

Thursday 2/20

Outpacing Ransomware: Proactive Prevention Strategies (Adlumin)

With steady infiltration tactics, rapid encryption, and relentless extortion, ransomware actors like LockBit continue to refine their attacks, making traditional security measures increasingly insufficient. Organizations must adopt a proactive, layered defense strategy to detect, prevent, and mitigate these threats before they cause lasting damage.

https://adlumin.com/post/outpacing-ransomware-proactive-prevention-strategies/

Threat Intelligence’s Role in Cybersecurity (Arctic Wolf)

Threat intelligence is valuable for security and IT teams as they work to detect and respond to threats in their own environments, as well as when those teams work to prioritize and implement proactive security measures

https://arcticwolf.com/resources/blog/threat-intelligences-role-in-cybersecurity/

Friday 2/21

Inside an MSIX Package

MSIX is a Windows app package format that was released in 2018 to simplify app deployment and management. Although not widely used at first, MSIX has gained traction in recent years. For example, the Microsoft Teams VDI installation now uses MSIX for deployment.

https://www.gothamtg.com/blog/inside-an-msix-package

Cyber Criminals Using URL Tricks to Deceive Users (Check Point)

In a newly observed scam, Check Point researchers found 200,000 phishing emails that abused URL information to obfuscate phishing links. The scam was first observed on January 21st, and remains ongoing, although the daily threat volume is decreasing.

https://blog.checkpoint.com/securing-user-and-access/how-real-time-security-will-drive-blockchain-adoption/