Discovered: January 31, 2019 Updated: February 01, 2019 8:42:10 AM Type: Trojan Infection Length: Varies Systems Affected: Windows Infostealer.Rultazo!g4 isRead more.
Discovered: February 01, 2019 Updated: February 01, 2019 8:50:15 AM Type: Trojan Infection Length: Varies Systems Affected: Windows Packed.Generic.542 isRead more.
Bypass Google Filters & Launching CSV Malware via Google Sheets
Cybercriminals are using new sophisticated techniques to spread CSV malware via Google sheets instead of using Microsoft Excel sheet whichRead more.
Airbus Data Breach – Hackers Stolen Employee Sensitive & Personal Data
Airbus IT system suffering from a data breach that resulted in unauthorized access of Airbus employees personal & Sensitive Data.Read more.
IT disaster recovery procedures
Regular testing, auditing, and rehearsal of your disaster recovery plans are essential to make sure that they do work, andRead more.
Internet Usage Guidelines
Organization may provides Internet access primarily to enable the conduct of IT and administrative activities in support of the organisation’sRead more.
Physical controls are often viewed as involving only physical access to a facility. However, physical controls also include access toRead more.
Network User Names and Passwords
Passwords are the first line of defense for the protection of AU information system resources. Using good passwords will helpRead more.
SAP Monthly Security bulletin January 2019
Critical issues closed by SAP Security Notes in January The following SAP Security Notes can patch the most severe vulnerabilitiesRead more.