Systems

  • Blog

    Hackers lurked in Treasury OCC’s systems since June 2023 breach

    Unknown attackers who breached the Treasury’s Office of the Comptroller of the Currency (OCC) in June 2023 gained access to over 150,000 emails, according to anonymous sources familiar with the matter. The OCC is an independent bureau of the U.S. Department of the Treasury that oversees banks and federal savings associations and ensures they comply with applicable laws and regulations,…

    Read More »
  • Blog

    Banks are persisting with the ‘patch and upgrade’ approach to legacy systems – and it’s swallowing up IT budgets

    Banks are spending a staggering 70% of their budgets on maintaining outdated legacy systems, with many using an expensive ‘patch and upgrade’ approach. According to research from RS2, this strategy is soaking up resources, placing significant strain on IT workers, and holding back digital transformation goals across the sector. RS2 said the traditional strategy of patch and upgrade – simply…

    Read More »
  • Blog

    Maintaining institutional memory is hard enough – AI knowledge systems will make it worse

    AI can hallucinate many things, but are we headed for a world where tools like ChatGPT and Gemini are crafting standard operating procedures or employee handbooks? Have we begun to entrust AI not just with our menial and creative tasks, but also given it the responsibility to maintain companies’ viability? God, I hope not. If the last few years are…

    Read More »
  • Blog

    Healthcare systems are rife with exploits — and ransomware gangs have noticed

    Healthcare organizations are facing serious threats from ransomware groups, with nearly nine-in-ten (89%) found to have medical devices that are vulnerable to exploits. That’s according to research from Claroty, which examined the state of security among healthcare organizations — and the diagnosis isn’t good. The report found that effectively all (99%) of healthcare organizations have at least one known, actively…

    Read More »
  • Blog

    The No-Stress Guide to Septic Systems

    It’s easier to get your head around maintenance when you have a clear sense of parts and function. Here’s an overview of how a conventional home septic system works: Instead of shunting wastewater into the sewer system, a septic system sends all water (and any waste) from sinks, showers, and toilets into a large watertight tank buried on the property.…

    Read More »
  • Blog

    EncryptHub linked to MMC zero-day attacks on Windows systems

    A threat actor known as EncryptHub has been linked to Windows zero-day attacks exploiting a Microsoft Management Console vulnerability patched this month. Uncovered by Trend Micro staff researcher Aliakbar Zahravi, this security feature bypass (dubbed ‘MSC EvilTwin’ and now tracked as CVE-2025-26633) resides in how MSC files are handled on vulnerable devices. Attackers can leverage the vulnerability to evade Windows…

    Read More »
  • Blog

    Best DIY Home Security Systems of 2025

    DIY home security systems have become a popular alternative to professionally installed systems. Even ADT, whose systems historically could only be bought through an installer, now allows you to buy its systems directly from the company and install them yourself. There are many things to consider when choosing a DIY home security system. Is it easy to set up and…

    Read More »
  • Blog

    New VanHelsing ransomware targets Windows, ARM, ESXi systems

    A new multi-platform ransomware-as-a-service (RaaS) operation named VanHelsing has emerged, targeting Windows, Linux, BSD, ARM, and ESXi systems. VanHelsing was first promoted on underground cybercrime platforms on March 7, offering experienced affiliates a free pass to join while mandating a deposit of $5,000 from less experienced threat actors. The new ransomware operation was first documented by CYFIRMA late last week,…

    Read More »
  • Blog

    Integrating Low-Code Platforms with Legacy Systems

    Low-code platforms accelerate application development and automate business processes. These platforms enable users to create applications with minimal hand-coding, using visual interfaces and pre-built components. Many organizations still rely on legacy systems that have been in use for years or even decades. These legacy systems are deeply embedded and are often difficult to replace due to their complexity, cost, and…

    Read More »
  • Blog

    Best Home Security Systems of 2025

    Home security systems differ in ways you can’t see, such as the reliability of their sensors and their tech support services. These differences came to light in our first-ever survey on home security systems owned by more than 11,000 Consumer Reports members. We used those results to create our first home security system satisfaction ratings. Below you’ll find the top…

    Read More »
Back to top button
close