IT-Security Resource Library
Make sure your organization is prepared.
The Path to Desired State Configuration: Where to Focus and Why
Managing devices has never been a simple task … and organizations’ adoption of “work from anywhere” policies are now making it that much harder for IT and security teams. As we settle into this ...
CloudFlare ID’s active exploits of newer log4j vulnerability
An estimated third of all the websites in the world run Apache server software and remain vulnerable to serious cybersecurity threats, according to cybersecurity experts at Cloudflare reviewing Apache’s log4j vulnerability. Researchers have logged attacks on 44% ...
Is Aiden vulnerable to CVE-2021-44228 (Log4j & Log4Shell)?
Aiden's solution does not use Java and therefore is not vulnerable to CVE-2021-44228. Like many companies, we use software to run our business, like project management, billing, accounting, etc. We are currently checking all services ...
|Press Release| IT-security startup Aiden reaches 5x ARR in under 12 months with launch of intelligent endpoint management solution.
PLANO, TEXAS, December 6, 2021 – While 2021 brought massive cyberattacks and business disruptions that led to IT leaders feeling added pressure, the team at Aiden brought a unique solution to market. Aiden’s intelligent endpoint ...
Why Software Patch Management Isn’t a Silver Bullet to Remediate Vulnerabilities
Software patching is an important part of remediating vulnerabilities … but patch management comes with plenty of challenges. This post covers why software patching is critical, the patching challenges organizations face, and how to fix them.
Aiden is Now Part of Microsoft for Startups
Today, we have some exciting (and different) news to share. Aiden is now part of the Microsoft for Startups community. What is Microsoft for Startups? Microsoft for Startups is a global program dedicated to helping startups with ...
Bank of America Insider BEC Scam, FontOnLake Malware, New Findings About Ransomware Costs, Python-based ESXi Server Attack, Office365 Password Spraying
1. Bank of America employee charged with insider BEC scam A Bank of America employee and two other perpetrators were accused of money laundering, aggravated identity theft, and alleged involvement in Business Email Compromise (BEC) ...
3 Reasons to Run a Tabletop Exercise To Determine Your IT Budget
Who knew that creating an IT budget for the upcoming year would require a crystal ball? In these unpredictable times, planning an IT budget is challenging at best. Your organization likely isn’t going back to ...
Malware Samples Target Windows OS from Linux Subsystem, New Findings About Cloud-Based Attacks, AUKUS Pact, U.S. Hacking on Behalf of UAE, Master Decryptor for REvil Victims
1. Malware samples target Windows operating systems from its Linux subsystem Security researchers discovered a strain of malware samples developed to compromise the Windows subsystem in Linux and then laterally move to the native Windows enclave. Threat ...