A Russian cyber vigilante is patching outdated MikroTik routers exposed online

Security Affairs

Alexey is a Russian-speaking cyber vigilante that decided to fix the MikroTik routers and he claims to be e system administrator. The experts at Tenable Research presented the technique on October 7 at DerbyCon 8.0

Mining 102

How to start your career in cyber security

IT Governance

Technically, you don’t need any cyber security experience to get started, though many people entering the field will come from jobs that have similar skillsets, such as systems administration or information analysis. A version of this blog was originally published on 8 December 2017.

Tips 71

User Conference Attendees Learn How to Maximize their DocuWare Experience

Document Imaging Report

The educational format provided system administrators and end users with training and best practices for applying DocuWare applications that empower their business to not just keep pace but to stay ahead. Integrating DocuWare with another system such as Outlook.

Q&A: Here’s why robust ‘privileged access management’ has never been more vital

The Last Watchdog

However, lacking robust protection, privileged accounts, which are intended to give administrators the access they need to manage critical systems, can instead be manipulated to enable attackers to move laterally across an organization’s network. The concept was based on the root access that the accounts provided to IT and systems administrators, who used these power accounts to maintain the network and systems.

Access 128

Only now we known that International Civil Aviation Organization (ICAO) was hacked in 2016

Security Affairs

“Mail server, domain administrator and system administrator accounts were all affected, giving cyberespions access to the past and current passwords of more than 2,000 ICAO system users.

Five Eyes Intelligence agencies warn of popular hacking tools

Security Affairs

To aid the work of network defenders and systems administrators, we also provide advice on limiting the effectiveness of these tools and detecting their use on a network.” It poses a threat to several different operating systems, including Windows, Linux, MAC OS X, and Android.” Their widespread availability presents a challenge for network defense and threat-actor attribution.”

Tools 87

Georgia Governor Vetoes Broad-Reaching Computer Crime Bill, Highlighting Debate Around Bug Bounty Programs

Data Matters

Specifically, researchers believed that the current version of SB 315 could chill security research—both the purely academic and the “white hats”—ultimately discouraging individuals from identifying vulnerabilities in networks and alerting system administrators of the issues. Organizations have employed bug bounty programs in an effort to encourage researchers to report security flaws in their systems.

Facebook May Have Gotten Hacked, and Maybe It’s Better We Don’t Know

Adam Levin

Denying anything happened gives system administrators more time to identify and patch newly discovered vulnerabilities. Changing the architecture of three separate applications at a fundamental level not only opens the door to human error and system glitches but also presents a golden opportunity for hackers, and that should be what we’re talking about–before anything bad happens.

How To Build A Cybersecurity Career | What Really Matters

Cyber Info Veritas

Since the general work of a cybersecurity specialist is to ensure that computer systems and networks are secure—essentially meaning cybersecurity experts are in charge of the electronic security of an organization—they must be knowledgeable.

Linux on System z: a Better Place for Your DB2 for z/OS Client-Server Applications

Robert's Db2

In DB2 for z/OS circles, there has been an evolution of attitudes concerning Linux on System z. One of the mainframers on this team had a suggestion: why not add a few IFL engines (more on this to come) to our System z servers and use those to consolidate a lot of our Linux systems (which were running primarily on x86 boxes)? The person who was advocating running Linux on System z made some good points, but the idea didn't get far and was set aside.

DB2 for z/OS Roles: Trust Me on This One (Part 1)

Robert's Db2

The person asking the question had a need to provide DBAs in certain geographies with the privileges needed to get their work done, but in a way that would deny them access to data in user (versus system) tables. In a follow-on Part 2 entry, I'll address the challenge of enabling a DBA or system administrator to do his or her job whilst preventing that person from being able to access data in user tables.