News
|Press Release| Aiden Technologies Adds Joe Fousek as Law Firm Technology Expert to bolster IT and Security Expertise
Fousek brings more than 30 years of experience leading and introducing innovation to IT teams at nation’s leading law firms. McKinney, TX, November 15, 2023 – Aiden Technologies, the provider of modern, intelligent software packaging and deployment for Microsoft Windows, today announced that law firm technology expert Joe Fousek has joined the company as a legal industry Business Consultant, ...
|Press Release| Aiden Launches into Legal Market with New Customers Bond, Schoeneck & King, and Koley Jessen
Aiden Set to Exhibit in ILTACON’s Startup Hub MCKINNEY, Texas – August 17, 2023 – Aiden Technologies, the provider of modern, intelligent software packaging and deployment for Microsoft Windows, announces the company’s launch into the legal market with the addition of new law firm clients Bond Schoeneck & King and Koley Jessen. The firms have selected Aiden to automate OS deployment and ...
3 Key Takeaways from the 2023 ElevateIT Dallas Closing Keynote
At ElevateIT in Dallas on Wednesday, June 7th, Joshua Aaron- Aiden CEO, moderated the closing keynote panel on Cybercrime, Nation-States, and the Emerging Threat Landscape for guest speakers John Kindervag, Founder of Zero Trust, Stefan Hare Network Intrusion Forensic Analyst, U.S. Secret Service, and Joshua Jacobs, Special Agent, FBI Cyber, Dallas. They discussed various issues, including the increasing levels ...
|Press Release| Aiden Completes $4.5 Million Round of Seed Funding
Aiden Technologies secures $4.5M in second round of seed funding from co-lead investors Right Side Capital Management & Blu Venture Investors.
|Press Release| Aiden’s 3x ARR in 2022 has the Windows IT Automation emerging leader poised for Rapid Growth in 2023
Hitting key 2022 milestones, Aiden has established itself as an emerging leader in the rapidly-growing IT automation market, which positions the company in 2023 for another significant year of growth.
|Press Release| Aiden Expands its Industry-Leading Advisory Board with Five Luminaries
The new members bring expertise in finance, risk mitigation, insurance, legal, cybersecurity, data privacy and management of high-growth companies.
Dave Ruedger, CISO – How AidenVision improves cyber risk visibility
Sean Maloney, Aiden's technical co-founder, explains why he created Aiden's technology and hints at what we're launching next week to complete his vision for providing a fully-automated desired state configuration (DSC) solution to our customers.
|Press Release| End Breaches Related to Security Hygiene with AidenVision™
However good they think their processes are, CIOs, CTOs, CISOs, risk committees, and boards of directors, rightly fear that their organization’s computers are not in compliance with their cybersecurity and operational policies. What’s needed is a compliance-based, wholistic view across all computers in an organization's enterprise. With AidenVision, IT teams can quickly surface issues and reduce time-to-patch, improving security hygiene and digital end-user experience (DEX).
“This Completes the Dream” – Sean Maloney’s vision for Aiden comes to life with our next big release
Sean Maloney, Aiden's technical co-founder, explains why he created Aiden's technology and hints at what we're launching next week to complete his vision for providing a fully-automated desired state configuration (DSC) solution to our customers.
Invitae implements Aiden and wins 2022 CSO50 Award for outstanding security strategy.
CSO50 Conference & Awards honored all 50 winners during their annual conference from September 19th to the 21st in National Harbor, MD. The CSO50 Awards honors 50 security projects and initiatives demonstrating exceptional business value and risk leadership. Dave Ruedger, CISO at Sunrun (Invitae's prior CISO), and Joshua Aaron, Aiden Technologies CEO, were invited to receive the award and ...
Automate Microsoft Upgrades from Windows 7 to Windows 10
Starting on January 10th, 2023, Microsoft 365 will no longer provide any new updates or security patches for Windows 7 and 8.1. This means that these operating systems are exposed to greater vulnerabilities and will be less secure than ever. If you're still using either of these versions of Windows, now is the time to get moving and upgrade ...
|Press Release| Aiden Technologies Moves HQ to McKinney, TX
AI-Focused Enterprise Tech Startup Receives Grant Through McKinney’s Innovation Fund MCKINNEY, TEXAS, JUNE 14, 2022 – Aiden Technologies announced today its move from Plano to McKinney, Texas to capitalize on the growth and opportunities in the entrepreneurial sector in the city. The AI and cybersecurity-focused startup with offices in NY and CA will open its new headquarters in Serendipity ...
Windows Autopatch + Aiden = IT Security Innovation
When Bill Gates started Microsoft, he had envisioned “a computer on every desk and in every home,” but I’m convinced he never imagined back then how hard it would become to keep every computer updated, patched, and free of software and firmware vulnerabilities. The innovation of computer networks and the Internet, coupled with rapid adoption of enterprise software, has made ...
|Press Release| Aiden’s Cloud Enablement Powers WFA for Microsoft Modern Work
PLANO, TEXAS, February 24, 2022 – Aiden, a modern, intelligent software packaging and deployment solution for Microsoft Windows, has introduced Cloud Enablement to reduce the cybersecurity risks and logistical challenges of today’s dispersed workforce. This new feature allows IT teams to keep computers updated and secure for organizations supporting WFA (Work From Anywhere). By shortening the time to remediate vulnerabilities from ...
The Path to Desired State Configuration: Where to Focus and Why
Managing devices has never been a simple task … and organizations’ adoption of “work from anywhere” policies are now making it that much harder for IT and security teams. As we settle into this new normal, organizations are working on better processes to manage computers, secure the modern enterprise, and elevate end-user experience. Once they reach (or at least ...
CloudFlare ID’s active exploits of newer log4j vulnerability
An estimated third of all the websites in the world run Apache server software and remain vulnerable to serious cybersecurity threats, according to cybersecurity experts at Cloudflare reviewing Apache’s log4j vulnerability. Researchers have logged attacks on 44% of all corporate networks globally using log4j, and signs that nation-state and other well-funded threat actors are doubling down on the opportunity to attack unpatched systems are ...
|Press Release| IT-security startup Aiden reaches 5x ARR in under 12 months with launch of intelligent endpoint management solution.
PLANO, TEXAS, December 6, 2021 – While 2021 brought massive cyberattacks and business disruptions that led to IT leaders feeling added pressure, the team at Aiden brought a unique solution to market. Aiden’s intelligent endpoint management solution has demonstrated a 97% reduction in vulnerabilities, 75% fewer help desk tickets, and dramatic savings in time spent provisioning computers. By automating tedious ...
Aiden is Now Part of Microsoft for Startups
Today, we have some exciting (and different) news to share. Aiden is now part of the Microsoft for Startups community. What is Microsoft for Startups? Microsoft for Startups is a global program dedicated to helping startups with Microsoft-based technologies scale. Each year, Microsoft selects 200 startups to be part of their program with a rigorous selection process. To be accepted, startups have ...
Bank of America Insider BEC Scam, FontOnLake Malware, New Findings About Ransomware Costs, Python-based ESXi Server Attack, Office365 Password Spraying
1. Bank of America employee charged with insider BEC scam A Bank of America employee and two other perpetrators were accused of money laundering, aggravated identity theft, and alleged involvement in Business Email Compromise (BEC) scams. The three actors targeted small and large companies across the globe, but mainly in the United States. By using phishing techniques and deploying malware, the threat ...
Malware Samples Target Windows OS from Linux Subsystem, New Findings About Cloud-Based Attacks, AUKUS Pact, U.S. Hacking on Behalf of UAE, Master Decryptor for REvil Victims
1. Malware samples target Windows operating systems from its Linux subsystem Security researchers discovered a strain of malware samples developed to compromise the Windows subsystem in Linux and then laterally move to the native Windows enclave. Threat actors created the malware samples using Python code. They run on Debian systems and have a low detection rate for traditional security controls. The malware developers packaged the samples in ...
Ransomware Gang Threatens to Leak Stolen Data, REvil Back in Action, New Zero-Day Attack in Microsoft Office, Atlassian Confluence Exploit, Fortinet VPN Password Leak
1. Ransomware gang threatens to leak stolen data if victims contact law enforcement During a ransomware attack, one of the most notorious ransomware groups, Ragnar Locker, threatened to leak complete data of victims who seek help from law enforcement agencies, including the Federal Bureau of Investigation (FBI). The ransomware group claims that incident investigators and recovery experts often collaborate with ...
Cybercriminal recruitment, House of Representatives Debate Cybersecurity, Attackers Sale Internet Bandwidth, Dropper-as-a-Service Attacks, Insight into the Conti ransomware
1. Cybercriminals Recruit English Speakers for Business Email Compromise Administrative and technical security controls have helped to reduce the effects of business email compromise (BEC). However, as a result, some BEC threat actors struggle to develop compelling phishing email messages for English corporate audiences. According to security researchers, said threat actors are now recruiting native English speakers in mass to ...
Banning Ransomware Payments, BlackMatter Hackers, Kubernetes Vulnerabilities, Kenetic Warfare, Windows 11 Malware
1. FBI Cautions Congress Against Banning Ransomware Payments Senior FBI officials advised the U.S. Congress not to mitigate ransomware threats by making ransom payments illegal. While the FBI cautioned organizations against sending ransomware payments to cybercriminals, the assistant director of the FBI (cyber division) argues that if Congress were to ban ransom payments, it could create opportunities for further extortion ...
Printer Vulnerability CVE-2021-3438, China Attacks Microsoft, Pulse Secure VPN Cyberattack, Pegasus Spyware Compromised, Kaseya Ransomware Decryption Key
1. A 16-year-old Printer Vulnerability CVE-2021-3438 (CVSS score: 8.8) Impacts Millions of Infrastructures A 16-year-old vulnerability was discovered in popular corporate printers that allow hackers to gain administrative rights to perform several activities on systems, including the ability to install rogue programs, view, change, encrypt or wipe data. This critical vulnerability is prevalent in HP, Samsung, and Xerox printer software, impacting ...
The Kaseya Ransomware Attack SME Breakdown, DOD Data Left Unprotected, Morgan Stanley Data Breach & Email Exploitation
1. Kaseya Ransomware Attackers Demand A $70 Million Ransom An affiliate of the notorious REvil ransomware gang compromised Kaseya’s virtual systems administrator (VSA) software. The Russian-linked attackers compromised the backend architecture of the IT infrastructure management tool. They used its notification capability to send a malicious update to VSA servers running on client environments. Thus, installing a ransomware code onto ...
LinkedIn Data Breach, Ransomware Payment Legislation, US Payment Processing Data Security, Google Compute Engine Vulnerability, NIST Critical Software
1. 700 million LinkedIn Users Impacted By a Data Breach The corporate social network, LinkedIn, experienced a significant data breach that affected 92% of its user base. This incident was announced by the malicious actors, who successfully accessed sensitive user data by misusing API functionalities to conduct unauthorized data scraping activities. According to security researchers, this data breach affected over ...
Double Ransomware Attacks, Carnival Cruise’s Data Breach, REvil Compromises U.S. Nuclear Weapons Contractor, CVS Gets Hacked, G7 Cracks Down On Russia
1. After Paying Off The First Ransomware Demand, Most Firms Face A Second Ransomware Attack Security experts discovered that ransomware attackers deploy secondary ransomware attacks against firms that pay off initial ransom demands. After paying off a ransom demand, firms often receive a decryptor for their hijacked systems. However, most attackers corrupt hijacked systems by creating backdoors that allow future ...
Chinese Threat Actors Target NY MTA, Surge in Brokerage Account Hacks, Fake Encrypted Chat Platform Anom Lures Criminals, Ransomware Attacks Prioritized as Terrorism
1. Chinese Threat Actors Target New York’s MTA Chinese-sponsored threat actors leveraged Pulse Secure vulnerabilities to compromise systems belonging to the New York Metropolitan Transportation Authority (MTA). It is unclear why state-sponsored actors targeted the MTA. Still, security experts investigating the case speculate that China may be trying to obtain sensitive information on U.S. transit networks to gain an advantage ...
|Press Release| Aiden Technologies Secures $2.9 Million in Funding to Empower Organizations with Automated Endpoint Management Solution
Former US Cyber Czar Richard A. Clarke Joins Right Side Capital Management and Cybersecurity Industry Luminaries in Seed Round Plano, Texas – June 8th, 2021 – Aiden Technologies, a leading solutions provider of software deployment and patch management solutions for Microsoft Windows, today announced that the company has raised $2.9 million in its seed funding round. The round was ...
Antivirus Softwares Vulnerable to ‘Cut and Mouse’, JBS Foods Cyber-Attack, Ransomware Hinders Criminal Prosecutions, US Supreme Court Restricts CFAA, US Nuclear Bunker Secrets Discovered
1. Security researchers reveal stealthy techniques to bypass antivirus tools and ransomware defenses Security researchers discovered significant vulnerabilities in popular antivirus tools, which could be exploited to deactivate protective mechanisms to launch ransomware attacks and other malicious operations. According to said researchers, of the 29 antivirus tools evaluated, 14 were found susceptible to the 'Ghost Control' attack technique. In comparison, ...
Colonial Pipeline ransomware attack fallout, President Biden’s executive cybersecurity order, triple extortion, Truist Bank spear-phishing campaign, AXA Insurance becomes victim
1. Congress introduced two bills in the wake of the Colonial Pipeline ransomware attack Following the recent ransomware attack against Colonial Pipeline, which caused gas shortages in several states, the U.S. Congress introduced two bipartisan bills designed to mitigate cybersecurity weaknesses across the nation’s critical infrastructure, including the oil and gas sector. The first congressional bill, the Pipeline Security Act, ...
TeaBot Wreaks Havoc, New Malware Strains run Wild, Small Business Ransomware, Microsoft Office 365 Insider Threats, CISA Issues Subpoena
1. A New and Lethal Banking Trojan, TeaBot, Wreaks Havoc For European Financial Institutions Cybersecurity experts warn users of a new Android Trojan currently being exploited in the wild against banks and other financial institutions in the Netherlands, Spain, Belgium, and Italy. This trojan is called ‘TeaBot’ (or Anatsa), and it is used to hijack users’ credentials via SMS messages. ...
5 Top Takeaways from the IT-Security Paradigm Shift Panel Discussion
Real-world advice on covering the fundamentals of IT security with upper management, and how automation and AI have a crucial role to play in reducing cybersecurity risk.
Ransomed Companies = Ransomed Customers, Unpatched Cyber Infrastructure Targeted Worldwide and Rust Leaks
Cring ransomware targets customers of hacked companies, Fortinet vulnerabilities expose US cyber operations, Rust leaks data & EU commission hacked
|Press Release| Aiden Innovates AI-Driven Natural Language Processing and Unparalleled Automation for Microsoft Windows Endpoint Management
PLANO, TEXAS April 8, 2021 – Aiden launched today unveiling its DevOps for Windows solution to automate enterprise endpoint management. As all organizations confront lingering vulnerabilities that require patching systems daily, IT is increasingly responsible to identify, remediate and validate new issues. Aiden's technology, developed and proven in two of America's leading private equity (PE) firms, bridges the gap between ...
Hackers Target EDR Tools, Nuke Account Spouts Gibberish, Ransomware Labelled National Security Threat
Threat actors find ways against common endpoint security tools, US government classifies ransomware as a national security threat, an unattended government agency Twitter account that is responsible for US nuclear arsenal tweeted gibberish, a deluge of tools is actually making it harder for IT teams to assess their network's security and PHP’S ‘Git’ server compromised to add Backdoors to PHP source codes.
Less Than 25% of New IT Tools Meet Security Goals, Office365 Scams, New D/TLS, Purple Fox, REvil Hacks | aiden IT Security News
Survey finds IT teams are over-burdened with tools that don't fully meet security goals, financial phishing attacks imitate Office365 and researchers discover new D/TLS, Purple Fox, REvil ransomware hacks.
US Gov. Using Outdated Android OS, Ransomware Demands Increase, Malware Detection Falls Short, Microsoft Teams and Sharepoint Bug, Pictures Steal CC Data | aiden IT Security News
1. 99.2% of U.S. Government Android Users Are Using Outdated OS Versions Out of the 200 million+ mobile devices being used by local, state, and federal government employees, a majority of said devices run on Android operating systems (OS). Shockingly, only 0.08% of those devices are operating on the newest version of said OS, which exposes those critical devices to ...
Cyber Threat Act, Infamous Financial Hackers Return, EBA Targeted in Exchange Hack | aiden IT Security News
Proposed US Cyber Threat Act would allow Americans to sue foreign states for damages stemming from cyberattacks, infamous financial hackers FIN8 return with new tools , European Banking Authority targeted in Microsoft Exchange hack, Tesla and several other companies have security cameras hacked and suspected state-sponsored threats from China target Linux systems with new malware.
Microsoft Exchange Hack: Biden Launches Emergency Task Force
Biden administration launches emergency task force as latest wide-ranging Microsoft Exchange hack taxes cybersecurity resources still recovering from last year's SolarWinds attack.
|Exclusive| Gartner Event – Emerging Tech CEOs Return to Growth
aiden CEO Joshua Aaron to participate in Gartner Research's Annual CEO Survey Insights Report for a special event on Emerging Tech CEOs Return to Growth scheduled for March 11th, 2021 at 11am EST US.
Federal Patch Order for Microsoft Exchange, Investment Firms Newly Scammed, Ryuk Ransomware Spreads Laterally – Cybersecurity News
US Dept. of Homeland Security issues patch order to any federal agencies using Microsoft Exchange, fake "capital call" emails target investors and investment firms, Ryuk ransomware adapts to move laterally through Windows LAN devices, Mobile adware campaigns targeting online banking and crypto-currency wallets sees expansive growth and threat actors game Google's SEO to prioritize payload distribution from fake sites.
Microsoft Identifies New Cyberattack Exploits, Issues Patches for On-Premises Exchange Servers
Microsoft announced tonight that it has identified new nation-state cyberattacks using previously unknown exploits that target the company’s on-premises Exchange Server software. As a result, to minimize or avoid the impacts of this situation, Microsoft highly recommends that you take immediate action to apply the patches for any on-premises Exchange deployments you have or are managing for a customer or ...
Unpatched Jail Software Forgets to Release Prisoners, Sequoia Venture Capital Hacked, Ransomware Strikes Aerospace Vendor – IT Security News and Trends
Major venture capital firm Sequoia fell victim to a targeted phishing campaign. Non-violent prisoners were kept after their scheduled release dates in Arizona due to a bug in custom software that failed to update prisoner records accurately. CLOP ransomware gang struck Bombardier, shadow attacks dupe PDF anti-tampering security and NGINX misconfigurations lead to website attacks.
Kia Motors Hack, California DMV Data Breach, Morse Code Phishing Campaigns – Cybersecurity News and Trends
1. Kia Motors Suffers a Ransomware Attack, and a $20 million Ransom is Demanded The notorious ransomware gang, DoppelPaymer, has seized critical systems belonging to Kia Motors America. Thus, impacting business continuity within 800 dealerships; the integrity of critical data; and the company’s reputation. According to the attackers, to receive a decryptor and a return back to normalcy, Kia Motors ...
|Press Release| Aiden Gets a Boost from Its Blockbuster Board of Trusted Advisors
Notable Technology Leaders To Support Autonomous Endpoint Security Managed Service Provider Plano, Texas – February 16, 2021 – Aiden, a leading provider of autonomous endpoint security managed services, today unveiled the roster of accomplished professionals, including several IT and Cybersecurity leaders, who will serve on the company’s advisory board. These trusted advisors include luminaries from highly esteemed technology, media, ...
Poor Patching Put Businesses At Risk, China Has Stolen Your Data, SolarWinds Hack legal changes – Cybersecurity News and Trends
New data shows slow or ineffective software patching leads to more than a quarter of cybersecurity vulnerabilities, Evanina: Chinese government has stolen 80% of personally identifiable US consumer data, threat actors now targeting supercomputers, US federal, legal agencies told to file paper documents, and new ransomware encrypts virtual disks using VMWare vulnerabilities .
NetWalker Ransomware, Volatile Cedar Cyberespionage, Windows 7 TCP/IP Hijacking, USCellular CRM Hacked, Trickbot Phishing Attacks – Cybersecurity News and Trends
International taskforce disables NetWalker, Windows 7 TCP/IP hijacks and Trickbot ransomware returns with added intelligence
DDoS Attacks Hijack Windows RDP, SonicWall, 7-Zip, Google Forms, Airline Data Stolen– Cybersecurity News and Trends
As the cybersecurity industry is still dealing with the fallout of the SolarWinds hack, more discoveries were made this week about its scope and vectors of attack. Significant exploits of popular software (Google Forms) and network-level hardware (SonicWall) also came to light.
Linux Under Cyberattack, New Phishing Attacks, MFA Pass The Cookie Hack – Cybersecurity News and Trends
File-less malware used in linux cyberattack, phishing attacks use remotely hosted images to bypass email filters, MFA PassTheCookie Hack among other cybersecurity news
JetBrains Breach, US Formally Blames Russia for SolarWinds Hack; Babuk Ransomware – Cybersecurity News and Trends
A Widely Used Software Company, An Entry Point For Huge U.S. Government Compromise State intelligence agencies disclosed that a popular software company (JetBrains), based in the Czech Republic and founded by three Russian engineers, is likely the entry point that Russian-sponsored threat actors used to insert back doors into numerous large technology companies and major U.S. government systems. SolarWinds, one ...
Cybersecurity in 2020: Year End Review
The year 2020 definitely made its way into everyone’s ‘naughty list’ for different reasons. Of course, COVID-19 was the chief reason, but we shall highlight more reasons in this article. The world faced an overwhelming number of cybersecurity threats in 2020: ransomware attacks increased by 715%; business email compromises (BECs) and phishing exploits were more sophisticated than ever before; third party and state-sponsored supply ...
Our Response to the SolarWinds Hack – A Global Cyber Pledge
Why should I take the #globalcyberpledge? How we're solving cybersecurity by individuals coming together and getting educated? What is the need for continuous improvement? Our privacy and freedom are under attack by foreign, state-sponsored bad actors and we’re standing by letting it happen. Why? Because the answers are right in front of us yet we remain complacent. Back in ...
Was the SolarWinds Hack Preventable?
The scope of the SolarWinds hack continues to expand as SolarWinds has updated their security advisory to show that more versions of the company’s Orion server software were impacted by the vulnerability than was previously thought. Furthermore, the Department of Homeland Security issued an emergency directive about the endpoint security breach telling federal agencies to shut down their servers until further notice. SolarWinds provides network administration, monitoring, ...
How Intelligent Automation Drives Digital Transformation
Digital transformation with the help of intelligent automation is a necessary next step in driving business growth and helps to overcome transitional obstacles.
Why a Vulnerability Scan is Not Enough.
A vulnerability scan is good for identifying weaknesses in your cybersecurity posture, but they're not the answer to securing your network...here's why.
How & Why Intelligent Automation Delivers Sustainable Cybersecurity
Adding intelligent automation like artificial intelligence & robotic process automation to your cybersecurity arsenal will help you to achieve sustained security across your technology environment.
Why Automating Cyber Hygiene is Key to Mitigating Risk
3 ways to maintain cyber hygiene and mitigate risk using automation in an ever-expanding virtual working environment, which isn't going anywhere any time soon.
The Seven Post-COVID-19 Healthcare IT Trends That Matter for CIOs
From remote work to vendor selection, these are the 7 post-covid healthcare IT trends that matter most for CIOs and technology leaders.
Get Updates Right In Your Inbox
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.