Skip to content

T-Mobile & AT&T Breaches: Dataprise Defense Digest

Dataprise Defense Digest 550x550

Two of the biggest wireless carriers in the US have been breached, resulting in millions of records of customer information being stolen and sold on the dark web. Besides the latent threat of identity theft, the repercussions of how this data could be misused could be disastrous on both a personal and a corporate level.

Read More

3 Cyberattack Vectors & 6 Layers of Cyber Defense for Credit Unions

Verizon DBIR

The average cost of a cyberattack in the financial industry is between $4 – $6 million, making it a profitable matter of interest for hackers all over the world. Click to learn about how attacks on financial institutions work and what can be done to mitigate them.

Read More

Microsoft Windows Server Exploit (PetitPotam): Dataprise Defense Digest

Dataprise Defense Digest 550x550

On July 23rd, French researcher Gilles Lionel (aka Topotam) revealed a new exploit technique called “PetitPotam” that modifies a previously discovered exploit in the Windows Print Spooler to allow attackers to exploit vulnerable Windows Servers without the Microsoft Print System Remote Protocol (MS-RPRN) API.

Read More

Continuous Monitoring Cybersecurity: Benefits for Midmarket Businesses

Why 24 7 Cybersecurity Visibility Is ImperativeΓCi

Considering the opportunities for criminals these days, in-house 24×7 cybersecurity monitoring is no longer just an option for midmarket businesses. In this blog we’ll look at the risks created by low cybersecurity visibility and why working with an MSP might be your best possible solution.

Read More

Windows10 Vulnerability (VU#506989): Dataprise Defense Digest

Dataprise Defense Digest 550x550

On July 20nd, The Carnegie Mellon University’s Software Engineering Institute published a note on a vulnerability (VU#506989) affecting windows 10 issued a warning about a critical vulnerability affecting Windows 10 build 1809 and above which can grant non-administrative users access to SAM, SYSTEM and SECURITY files.

Read More