Understanding and Preventing the Log4j Exploit and Botnets

Of all the security issues that have appeared over the last few years, none has had the impact of the Log4j exploit. Also called the Log4Shell, it was reported to the developers, the Apache Software Foundation, on 24 November, 2021, by the Chinese tech giant Alibaba and it took two weeks to develop and release a fix. The existence of the Log4j exploit was first publicly published in a tweet by Chen Zhaojun, a cyber security researcher with the Alibaba Cloud Security team on December 9, 2021

Continue Reading

Aruba leads the way on Wi-Fi 6E Standard Power!

The Wi-Fi Alliance and the Wireless Innovation Forum (WInnForum) have been the two leading industry organizations to take up that work, with ongoing liaison exchanges to coordinate their efforts. The Aruba/Federated AFC demonstration with CITC was the first time that a number of the work products of these organizations had been publicly tested. Members of Aruba’s CTO team have invested countless hours in these industry efforts, and we have been honored to lead/co-lead a number of them. It is very satisfying to witness the fruit of those efforts as they were demonstrated in Riyadh.

Continue Reading

TikShock: Don’t get caught out by these 5 TikTok scams

Cybercriminals are very creative and always follow trends closely, even predicting change before the masses in order to maximize the outcome of their techniques. Not too many years ago, there were only a few platforms to use to target new victims while leaving little evidence and unlikely to face any repercussions. The dark web became a place to buy and sell contraband, but the numbers didn’t ever really hit the relative big time with the audiences such that those taking advantage of the technology could actually achieve their wildest dreams.

Continue Reading

Four reasons to implement an XDR solution today

Getting in front of a threat by adopting a prevention-first strategy for early detection will allow organizations to stop disruptive attacks before they can cause damage. Preventing attacks from being successful is not just possible, it is much more cost-effective than remediation after the fact — you just need the right tools. To stay ahead of today’s advanced threats, organizations are adopting Extended Detection and Response solutions powered by Artificial Intelligence and Machine Learning that allow them not only automate detection and remediation of cyberattacks at scale

Continue Reading

Choosing a surveillance system provider: 4 things to consider

As more businesses in the UAE turn to intelligent video surveillance systems to unlock a host of benefits, it may be time for you to do the same. As with most important decision, you have to weigh up the different options available to you and make sure you understand the consequences. On the one hand, an end-to-end solution is simpler than a multi-vendor system and an excellent all-rounder. In the past a Multi-vendor solution offered more flexability and features but was extremely difficult to roll out successfully.

Continue Reading