Gartner: 5 ways to deal with network equipment shortages

Gartner: 5 ways to deal with network equipment shortages

How bad is the chip supply shortage? Gartner reports that clients are complaining about lead times as long as 400 days to get networking equipment, plus pricing increases and missed ship dates. “We expect lead times to remain high through early 2023, at which point we expect slow incremental improvement over the course of months,” Gartner wrote in a report titled, “What Are My Options for Dealing With Long Lead Times on Network Equipment?” Gartner…

Read More

Ghostwriter Group Targets NATO Members Managing Refugees

Ghostwriter Group Targets NATO Members Managing Refugees

Security researchers have detected a new phishing campaign linked to a notorious disinformation threat group, which is targeting European governments as they try to manage an influx of Ukrainian refugees. First spotted on February 24, the original phishing email was sent using a compromised account belonging to a member of the Ukrainian military, according to Proofpoint. The email itself piggybacked on news of a recent UN Security Council meeting, and contained a malicious XLS macro…

Read More

Pathways to the C-suite: CIO hopefuls look to level up

Pathways to the C-suite: CIO hopefuls look to level up

Andy Farella spent five years rising up the IT leadership ranks at Children’s Hospital of Philadelphia (CHOP) — first as director of business applications and then associate CIO — when he started feeling restless. “I was dealing with multiple aspects of the organization and involved with big projects, issues, and challenges,” Farella says. At the time he managed 125 people and was leading the technical side of a multiyear, multimillion-dollar ERP implementation. He reported to…

Read More

Warning: Hackers Are Targeting The Ukraine Refugee Crisis

Warning: Hackers Are Targeting The Ukraine Refugee Crisis

Ukrainian government agencies and cybersecurity companies warn about attempts to hack organizations helping hundreds of thousands leave the country as it is bombarded by Russian bombs. Michael Kappeler/dpa/picture alliance via Getty Images Cyberattacks have been launched on organizations and individuals helping refugees trying to get out of Ukraine. Some may have been carried out by a Belarus-linked hacking group and the attackers have access to an email account of at least one Ukrainian military officer,…

Read More

Ukraine Refugee Aid Targeted by Phishing Campaign

Ukraine Refugee Aid Targeted by Phishing Campaign

Hundreds of thousands of Ukrainians are fleeing their country as Russian troops advance on its capitol.  Getty Images European officials are being targeted by what appears to be a state-sponsored phishing campaign aimed at disrupting their efforts to help Ukrainian refugees, cybersecurity company Proofpoint said Wednesday. According to the company’s researchers, the attackers are using what’s possibly a compromised Ukrainian armed service member’s email account to target officials managing the logistics of refugees fleeing that…

Read More

NATO countries’ refugee management may have been targeted by Belarus-linked hackers – CyberScoop

NATO countries’ refugee management may have been targeted by Belarus-linked hackers – CyberScoop

Written by AJ Vicens Mar 2, 2022 | CYBERSCOOP A hacking group with a history of phishing attacks and disinformation against NATO nations may be using compromised Ukrainian armed service member emails to target European officials tasked with managing logistics around refugees fleeing Ukraine, according to findings published Monday. Researchers with cybersecurity firm Proofpoint report they detected an email Feb. 24 that carried a subject referencing the Feb. 24 emergency meeting of NATO on the…

Read More

Hackers Try to Target European Officials to Get Info on Ukrainian Refugees, Supplies

Hackers Try to Target European Officials to Get Info on Ukrainian Refugees, Supplies

Details of a new nation-state sponsored phishing campaign have been uncovered setting its sights on European governmental entities in what’s seen as an attempt to obtain intelligence on refugee and supply movement in the region. Enterprise security company Proofpoint, which detected the malicious emails for the first time on February 24, 2022, dubbed the social engineering attacks “Asylum Ambuscade.” “The email included a malicious macro attachment which utilized social engineering themes pertaining to the Emergency…

Read More

Wiperware (pseudo ransomware) used in Ukraine cyberattacks

Wiperware (pseudo ransomware) used in Ukraine cyberattacks

Wiperware (pseudo ransomware) used in Ukraine cyberattacks | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses…

Read More

4 tips for launching a simulated phishing campaign

4 tips for launching a simulated phishing campaign

4 tips for launching a simulated phishing campaign | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website…

Read More

Creating Your Disaster Recovery Action Plan | The State of Security

Creating Your Disaster Recovery Action Plan | The State of Security

Perhaps Disaster Recovery (DR) isn’t one of the hot terms like the Internet of Things (IoT) or Hybrid Cloud, but I would argue that re-examining your DR plan now might be one of the most important IT management initiatives on which you can focus your energy. Think about it. How much has the world changed in the past two years? Most people used to think about disasters as typical IT incidents such as system failure,…

Read More
1 3,198 3,199 3,200 3,201 3,202 4,070