XtranetIT's profile picture. Corporate and Educational IT
IT Technician training, software/hardware
Intel Gold Reseller;Fujitsu Partner;Trend Micro Partner;Microsoft Partner etc

Xtranet-ITSolutions

@XtranetIT

Corporate and Educational IT IT Technician training, software/hardware Intel Gold Reseller;Fujitsu Partner;Trend Micro Partner;Microsoft Partner etc

Users of video conferencing app Zoom have been targeted using suspicious domains, malicious files, and ‘Zoom bombing' as threat actors take advantage of work-from-home arrangements brought about by COVID-19. trso.co/E62756

XtranetIT's tweet image. Users of video conferencing app Zoom have been targeted using suspicious domains, malicious files, and ‘Zoom bombing' as threat actors take advantage of work-from-home arrangements brought about by COVID-19. trso.co/E62756

At least 25 people allegedly including a card fraud kingpin were arrested for card fraud by Russian federal investigators. trso.co/9D59CC

XtranetIT's tweet image. At least 25 people allegedly including a card fraud kingpin were arrested for card fraud by Russian federal investigators. trso.co/9D59CC

COVID-19 is being used in a variety of malicious campaigns including email spam, BEC, malware, ransomware, and malicious domains. trso.co/C89F56

XtranetIT's tweet image. COVID-19 is being used in a variety of malicious campaigns including email spam, BEC, malware, ransomware, and malicious domains. trso.co/C89F56

There has been an influx of employees signing in remotely to corporate networks and using cloud-based applications. But this shift could also open doors to security risks. Where should security fit in? trso.co/EA67B3

XtranetIT's tweet image. There has been an influx of employees signing in remotely to corporate networks and using cloud-based applications. But this shift could also open doors to security risks. Where should security fit in? trso.co/EA67B3

As part of a “data protection-by-design and default” approach recommended in the GDPR, pseudonymisation is a vital tool in the armoury for mitigating risk and non-compliance. But only if implemented correctly. trso.co/24F8B6

XtranetIT's tweet image. As part of a “data protection-by-design and default” approach recommended in the GDPR, pseudonymisation is a vital tool in the armoury for mitigating risk and non-compliance. But only if implemented correctly. trso.co/24F8B6

Notorious IoT malware Mirai has seen a recent increase in updates as a new variant emerges and a new vulnerability is targeted. trso.co/492FF6

XtranetIT's tweet image. Notorious IoT malware Mirai has seen a recent increase in updates as a new variant emerges and a new vulnerability is targeted. trso.co/492FF6

New report from Trend Micro: Review, Refocus, and Recalibrate: The 2019 Mobile Threat Landscape. trso.co/8F2443

XtranetIT's tweet image. New report from Trend Micro: Review, Refocus, and Recalibrate: The 2019 Mobile Threat Landscape. trso.co/8F2443

An RCE vulnerability affecting Windows have been discovered, with Microsoft rating its severity as critical. trso.co/2BF297

XtranetIT's tweet image. An RCE vulnerability affecting Windows have been discovered, with Microsoft rating its severity as critical. trso.co/2BF297

Forrester names Trend Micro a “leader” in its latest report, Forrester Wave™: Enterprise Detection and Response, Q1 2020. trso.co/49C5E6

XtranetIT's tweet image. Forrester names Trend Micro a “leader” in its latest report, Forrester Wave™: Enterprise Detection and Response, Q1 2020. trso.co/49C5E6

New ransomware variant Nefilim is distributed through exposed Remote Desktop Protocol (RDP) and threatens to release stolen data to the public. trso.co/986F22

XtranetIT's tweet image. New ransomware variant Nefilim is distributed through exposed Remote Desktop Protocol (RDP) and threatens to release stolen data to the public. trso.co/986F22

Sophisticated APT groups don't always target big-name brands or military and critical infrastructure sectors. As Trend Micro's latest research into the infamous Pawn Storm group highlights, they're even going after private schools and doctors. trso.co/9BCA9D

XtranetIT's tweet image. Sophisticated APT groups don't always target big-name brands or military and critical infrastructure sectors. As Trend Micro's latest research into the infamous Pawn Storm group highlights, they're even going after private schools and doctors. trso.co/9BCA9D

As organisations enforce remote working to reduce the impact of the virus. This makes it more important than ever to know how the bad guys are trying to cash in on COVID-19 and what you can do to stay safe. trso.co/E210E2

XtranetIT's tweet image. As organisations enforce remote working to reduce the impact of the virus. This makes it more important than ever to know how the bad guys are trying to cash in on COVID-19 and what you can do to stay safe. trso.co/E210E2

The notorious threat group Pawn Storm has been known to target high-profile entities, from governments to media for years. This research paper looks into the ways the group compromised email addresses and servers to facilitate credential phishing attacks. trso.co/52D101

XtranetIT's tweet image. The notorious threat group Pawn Storm has been known to target high-profile entities, from governments to media for years. This research paper looks into the ways the group compromised email addresses and servers to facilitate credential phishing attacks. trso.co/52D101

On Monday, Facebook sent its content moderators home. By Tuesday, it was falsely flagging and removing legitimate content. Why? trso.co/409A66

XtranetIT's tweet image. On Monday, Facebook sent its content moderators home. By Tuesday, it was falsely flagging and removing legitimate content. Why? trso.co/409A66

Paradise ransomware can now spread through Internet Query Files. trso.co/39838C

XtranetIT's tweet image. Paradise ransomware can now spread through Internet Query Files. trso.co/39838C

As the use of IoT extends beyond the home and goes into the vast industrial landscape, the scale of threats likewise grows. trso.co/4A7B6C

XtranetIT's tweet image. As the use of IoT extends beyond the home and goes into the vast industrial landscape, the scale of threats likewise grows. trso.co/4A7B6C

Threat actors take advantage of the spread of coronavirus for malicious campaigns. trso.co/A161DA

XtranetIT's tweet image. Threat actors take advantage of the spread of coronavirus for malicious campaigns. trso.co/A161DA

So you suddenly have a lot of staff working remotely. Telework is not new and a good percentage of the workforce already does so. But the companies who have a distributed workforce had time to plan for it, and to plan for it securely. trso.co/DE0D08

XtranetIT's tweet image. So you suddenly have a lot of staff working remotely. Telework is not new and a good percentage of the workforce already does so. But the companies who have a distributed workforce had time to plan for it, and to plan for it securely. trso.co/DE0D08

Containers provide a list of benefits to organizations that use them. They're light, flexible, add consistency across the environment and operate in isolation. However, security concerns prevent some organizations from employing containers. trso.co/7C5283

XtranetIT's tweet image. Containers provide a list of benefits to organizations that use them. They're light, flexible, add consistency across the environment and operate in isolation. However, security concerns prevent some organizations from employing containers. trso.co/7C5283

New variants of notorious banking trojan Trickbot was distributed via DLL and had features that focus on Windows 10. trso.co/D1B33C

XtranetIT's tweet image. New variants of notorious banking trojan Trickbot was distributed via DLL and had features that focus on Windows 10. trso.co/D1B33C

This account does not follow anyone

United States Trends

Loading...

Something went wrong.


Something went wrong.