Hiring Managers Looking for Systems Administrators

Cllax

When your company is on the hunt for systems administrators, you can be forgiven if you feel like the deck is stacked against you. The position is a hard one. Guest Post

Your next move: Cloud systems administrator

Information Management Resources

Becoming a cloud systems administrator allows you to be on the leading edge of systems technology in heavily virtualized environments, in an IT niche that will grow

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

6 reflections on the key role that system administrators play

Information Management Resources

In recognition of July 27 as System Administrator Appreciation Day, six technology executives share their thoughts on why these professionals are so vital to the organization. Hardware and software Data management Data types

The Ransomware Files, Episode 1: The School District

Data Breach Today

A systems administrator with a school district in Washington state recounts a brush with the Ryuk ransomware and how the district recovered through tenacity and a bit of luck

Payment Card Theft Ring Tech Leader Gets 10-Year Sentence

Data Breach Today

Fedir Hladyr of Ukraine Admitted to Working as System Admin for FIN7 A Ukrainian national who admitted to working as a system administrator and IT manager for the notorious FIN7 cybercriminal gang, which has been involved in the theft of millions of payment cards, has been sentenced to 10 years in federal prison.

OpenSSL Fixes Flaws That Could Lead to Server Takedowns

Data Breach Today

System Administrators Advised to Update to Latest Version That Addresses 2 Vulnerabilities Users of the OpenSSL crypto library should upgrade immediately to the latest version to eliminate serious flaws that attackers could exploit to shut down servers, some security experts warn

Dead System Admin's Credentials Used for Ransomware Attack

Data Breach Today

Sophos: 'Ghost' Accounts Present a Potential Security Danger The operators of the Nefilim ransomware used the credentials of a deceased system administrator to plant their crypto-locking malware in about 100 vulnerable systems during one attack, according to Sophos.

Edward Snowden in His Own Words: Why I Became a Whistle-Blower

WIRED Threat Level

Book excerpt: As a systems administrator, the young man who would expose vast, secret US surveillance saw freedom being encroached and decided he had to act. Backchannel Security

NSA Urges SysAdmins to Replace Obsolete TLS Protocols

Threatpost

The NSA released new guidance providing system administrators with the tools to update outdated TLS protocols. Government Vulnerabilities and Defense Industrial Base CloudFlare Department of Defense (DoD) government Heartbleed National Security System (NSS) NSA SSL TLS 1.0

Yandex security team caught admin selling access to users’ inboxes

Security Affairs

Russian internet and search company Yandex discloses a data breach, a system administrator was selling access to thousands of user mailboxes. The employee was one of three system administrators with the necessary access rights to provide technical support for the service.

Access 110

The right way to migrate to the cloud: All in, but with the right tools – New white paper

Quest Software

Learn the right way from this DCIG paper on system administration practices and performance monitoring tools.( Going all in to migrate to the cloud? read more ). Foglight Foglight for Virtualization

Interview: Streamlining the student experience with Jamf and AppConfig

Jamf

This interview with Matt Green, is an Apple System Administrator at Lubbock-Cooper ISD, outlines his use of a powerful yet rarely-discussed feature of MDM: Managed App Configuration.

MDM 87

How NC State University transitioned to and from crisis mode

Jamf

In this JNUC 2021 session, Joey Jenkins, Lead Systems Administrator, NC State University Libraries, and Everette Allen, Office of Information Technology, NC State University, discuss the challenges of the transition, their Jamf-assisted solutions and the lessons they’re taking into the future

Boosting Security Effectiveness with 'Adjuvants'

Dark Reading

How integrating corporate resources like the IT help desk, system administration, quality assurance and HR can breathe new life into your security program

Why you don’t want to run a roll-your-own cloud

DXC

But, but, as someone who cut his teeth on Unix system administration back in the 80s, I also run my own smaller private clouds using a homebrew of programs. Thanks to my job, I have accounts on many public clouds. I also have production private clouds — open-source OpenStack and NextCloud spring to mind. Self-hosting […]. Cloud

Working BlueKeep Exploit Developed by DHS

Threatpost

The Department of Homeland Security urged system administrators to update their Windows machines after testing a working BlueKeep exploit for Windows 2000. Hacks Vulnerabilities bluekeep Bluekeep exploit critical vulnerability DHS Exploit Microsoft WannaCry Windows 2000

5 ways containerization can help Documentum administrators

OpenText Information Management

IT and system administrators struggle to maintain and upgrade complex, highly customized content management platforms. And that’s just to manage the basics.

PyRoMine Uses NSA Exploit for Monero Mining and Backdoors

Threatpost

Not just a miner, the malware also sets up a hidden default account with system administrator privileges, to be used for re-infection and further attacks. Malware backdoor EternalRomance follow on attacks Monero pyromine remote desktop ShadowBrokers smb1

Kaseya Left Customer Portal Vulnerable to 2015 Flaw in its Own Software

Krebs on Security

The attackers exploited a vulnerability in software from Kaseya , a Miami-based company whose products help system administrators manage large networks remotely. “We are continuing to do forensic analysis on the system and investigating what data is actually there.”

IT 206

REvil Ransom Arrest, $6M Seizure, and $10M Reward

Krebs on Security

Prosecutors say Vasinskyi was involved in a number of REvil ransomware attacks, including the July 2021 attack against Kaseya , Miami-based company whose products help system administrators manage large networks remotely. The U.S.

Russia-linked hackers actively exploit CVE-2020-4006 VMware flaw, NSA warns

Security Affairs

The flaw is a command injection bug that could be exploited by attackers to execute commands on the host Linux and Windows operating systems using escalated privileges. An attacker could exploit this vulnerability to take control of an affected system.”

Log4J: What You Need to Know

Adam Levin

Unfortunately, there isn’t much that can be done by laypersons; the Log4J vulnerability needs to be addressed and patched by server and system administrators.

Career Choice Tip: Cybercrime is Mostly Boring

Krebs on Security

The researchers concluded that for many people involved, cybercrime amounts to little more than a boring office job sustaining the infrastructure on which these global markets rely, work that is little different in character from the activity of legitimate system administrators.

Chinese Hackers Stole an NSA Windows Exploit in 2014

Schneier on Security

Here’s the timeline : The timeline basically seems to be, according to Check Point: 2013: NSA’s Equation Group developed a set of exploits including one called EpMe that elevates one’s privileges on a vulnerable Windows system to system-administrator level, granting full control.

New iLOBleed Rootkit, the first time ever that malware targets iLO firmware

Security Affairs

A previously unknown rootkit, dubbed iLOBleed, was used in attacks aimed at HP Enterprise servers that wiped data off the infected systems. The module has full access to all the firmware, hardware, software, and operating system installed on the server. .

Hackers are targeting Soliton FileZen file-sharing servers

Security Affairs

The CVE-2021-20655 vulnerability could be exploited by a remote attacker with administrator rights to execute arbitrary OS commands via unspecified vectors. The vendor recommended changing system administrator account, reset access control, and installing the latest available version.

DDoS Mitigation Firm Founder Admits to DDoS

Krebs on Security

KrebsOnSecurity exposed the co-administrators of vDOS and obtained a copy of the entire vDOS database, including its registered users and a record of the attacks those users had paid vDOS to launch on their behalf.

StealthWorker botnet targets Synology NAS devices to drop ransomware

Security Affairs

Once compromised the device, threat actors employed it in a botnet used in attacks aimed at Linux systems, including Synology NAS. System administrators that have noticed suspicious activity on their devices should report it to Synology technical support.

Florence, Ala. Hit By Ransomware 12 Days After Being Alerted by KrebsOnSecurity

Krebs on Security

that their information technology systems had been infiltrated by hackers who specialize in deploying ransomware. ” But on Friday, Florence Mayor Steve Holt confirmed that a cyberattack had shut down the city’s email system.

Administrators of bulletproof hosting sentenced to prison in the US

Security Affairs

The two individuals, Aleksandr Skorodumov (33) of Lithuania, and Pavel Stassi (30) of Estonia, administrated the bulletproof hosting service between 2009 and 2015. The post Administrators of bulletproof hosting sentenced to prison in the US appeared first on Security Affairs.

Simplify records management while improving information governance

OpenText Information Management

Challenge: Your organization has many users involved in the lifecycle management of important information assets–from knowledge workers to legal associates to system administrators and, yes, Records Managers.

How to secure QNAP NAS devices? The vendor’s instructions

Security Affairs

If the NAS is exposed to the Internet the dashboard will display the message “The System Administration service can be directly accessible from an external IP address via the following protocols: HTTP.”.

Microsoft to notify Office 365 users of nation-state attacks

Security Affairs

The alerts are also sent to system administrators and security teams, who can directly contact the affected employees and take action to prevent their accounts take over.

US CISA and NSA publish guidance to secure Kubernetes deployments

Security Affairs

Kubernetes is an open-source container-orchestration system for automating computer application deployment, scaling, and management. Use strong authentication and authorization to limit user and administrator access as well as to limit the attack surface.

Google Glitch Left Passwords Unprotected for 14 Years

Adam Levin

Google has begun contacting system administrators whose organizations would have been affected by the glitch to encourage them to change their passwords. Google announced a glitch that stored unencrypted passwords belonging to several business customers, a situation that had been exploitable since 2005.

Cisco fixed a critical issue in the Unified Contact Center Express

Security Affairs

An attacker could exploit this vulnerability by sending a malicious serialized Java object to a specific listener on an affected system.” The issue could be exploited by supplying a malformed Java object to a specific listener on an vulnerable system.

Ransomware Gangs and the Name Game Distraction

Krebs on Security

REvil’s last big victim was Kaseya , a Miami-based company whose products help system administrators manage large networks remotely. It’s nice when ransomware gangs have their bitcoin stolen, malware servers shut down, or are otherwise forced to disband.

‘Wormable’ Flaw Leads July Microsoft Patches

Krebs on Security

” CVE-2020-1350 is just the latest worry for enterprise system administrators in charge of patching dangerous bugs in widely-used software. Before you update with this month’s patch batch, please make sure you have backed up your system and/or important files.

Ghost Blogging Platform Hacked To Mine Cryptocurrency

Adam Levin

Ghost, a Singapore-based blogging platform with 2,000,000 installations and 750,000 active users, announced that hackers had breached their systems. . As of May 4, Ghost announced that it had successfully purged the cryptocurrency mining malware from its systems.

A member of the FIN7 group was sentenced to 10 years in prison

Security Affairs

The Ukrainian national Fedir Hladyr (35), aka “das” or “AronaXus,” was sentenced to 10 years in prison for having served as a manager and systems administrator for the financially motivated group FIN7 , aka Carbanak.