Help
RSS
API
Feed
Maltego
Contact
Domain > news.provideserver.com
×
Welcome!
Right click nodes and scroll the mouse to navigate the graph.
×
More information on this domain is in
AlienVault OTX
Is this malicious?
Yes
No
DNS Resolutions
Date
IP Address
2024-10-25
20.223.51.7
(
ClassC
)
Port 443
HTTP/1.1 200 OKContent-Type: text/html; charsetutf-8Date: Fri, 25 Oct 2024 10:40:12 GMTEtag: W/f862-v/bWNxdvejitO0MIpZsnvq8sVrkStrict-Transport-Security: max-age31536000Vary: Accept-EncodingX-Content-Type-Options: nosniffX-Frame-Options: ALLOW-FROM https://amplify.notified.comX-Powered-By: ExpressTransfer-Encoding: chunked !DOCTYPE html>html langen>head> link relcanonical hrefhttps://news.provideserver.com/> title>ProVide/title> base href/> link relicon idappFavicon hrefhttps://cdn.filestackcontent.com/auto_image/fDiar0UQo25bupSvaLQU> meta charsetutf-8> meta nameviewport contentwidthdevice-width, initial-scale1>link relstylesheet hrefstyles.59cea37f4d550494.css>link hrefhttps://use.typekit.net/ill5vrt.css typetext/css relstylesheet mediascreen,print idtypekit-font>meta propertyog:url contentnews.provideserver.com>meta propertyog:title contentProVide>meta propertyog:type contentwebsite>meta propertyog:image contenthttps://cdn.filestackcontent.com/ADl2KZuKDRbS7BbbwOreQz/auto_image/resizewidth:1200,height:627,fit:clip,align:top/gzWiCcSST5ed2kNmto7s>meta propertyog:image:width content1200>meta propertyog:image:height content627>meta propertyog:description contentProVide Server combines a user-friendly web interface for user collaboration with powerful SFTP, FTPS and TFTP services. It allows all of your file transfers take place on your own private cloud, completely secure from the outside world.>meta namedescription contentProVide Server combines a user-friendly web interface for user collaboration with powerful SFTP, FTPS and TFTP services. It allows all of your file transfers take place on your own private cloud, completely secure from the outside world.>meta nametwitter:card contentsummary_large_image>meta namegoogle-site-verification contentOR0PHe12jGSiV1vmbTHggV0shaLfVYaSK-DjbVwR8dE>meta namerobots contentindex, follow>style ng-transitionnotified-newsroom>.article-slide-item_ngcontent-sc28{height:250px;width:100%;background-color:#fff;box-shadow:0 2px 4px #0000001a;position:relative;border:1px solid rgb(237,237,237);overflow:hidden}.article-slide-item.no-image_ngcontent-sc28 .content-wrapper_ngcontent-sc28{opacity:1;transform:translateZ(0)}.article-slide-item.no-image_ngcontent-sc28 .image_ngcontent-sc28{display:none}.article-slide-item_ngcontent-sc28:hover .image_ngcontent-sc28{opacity:0;transform:translate3d(0,-250px,0)}.article-slide-item_ngcontent-sc28:hover .content-wrapper_ngcontent-sc28{opacity:1;transform:translateZ(0)}.article-slide-item_ngcontent-sc28 .image_ngcontent-sc28{position:absolute;inset:0;width:100%;height:100%;background-size:cover;background-position:center center;backface-visibility:hidden;transition:all .35s;opacity:1}.article-slide-item_ngcontent-sc28 .content-wrapper_ngcontent-sc28{opacity:0;transition:opacity .35s,transform .35s;transform:translate3d(0,200px,0);position:absolute;inset:0}.article-slide-item_ngcontent-sc28 .content-wrapper_ngcontent-sc28 .content_ngcontent-sc28{padding:25px;position:absolute;left:0;right:0;color:#fff;top:50%;transform:translateY(-50%);opacity:1}.article-slide-item_ngcontent-sc28 .content-wrapper_ngcontent-sc28 .content_ngcontent-sc28 .published_ngcontent-sc28{font-size:.7rem}.article-slide-item_ngcontent-sc28 .content-wrapper_ngcontent-sc28 .content_ngcontent-sc28 .source_ngcontent-sc28{font-size:1rem;font-weight:600}.article-slide-item_ngcontent-sc28 .content-wrapper_ngcontent-sc28 .content_ngcontent-sc28 .text-wrapper_ngcontent-sc28{margin-top:7px}.article-slide-item_ngcontent-sc28 .content-wrapper_ngcontent-sc28 .content_ngcontent-sc28 .text-wrapper_ngcontent-sc28 .text_ngcontent-sc28{font-size:.9rem;position:relative;top:-5px}.article-slide-item_ngcontent-sc28 .content-wrapper_ngcontent-sc28 .content_ngcontent-sc28 .text-wrapper_ngcontent-sc28 .title_ngcontent-sc28{font-size:1rem;font-weight:700;white-space:nowrap;overflow:hidden;text-overflow:ellipsis;max-width:100%;display:inline-block}.box-layout_ngcontent-sc28{list-style:none;margin:-10px;padding:0}.box-layout_ngcontent-sc28 li_ngcontent-sc28{width:calc(25% - 20px);display:inline-block;margin:10px}@media (max-width: 37.5em){.box-layout_ngcontent-sc28 li_ngcontent-sc28{width:100%;margin:0}}@media (max-width: 50em) and (min-width: 37.5em){.box-layout_ngcontent-sc28 li_ngcontent-sc28{width:calc(33.33% - 20px)}}@media (max-width: 37.5em){.box-layout_ngcontent-sc28{margin:0}}.list-layout_ngcontent-sc28{list-style:none;padding:0}.list-layout_ngcontent-sc28 li_ngcontent-sc28{width:100%;display:block;margin-bottom:25px;overflow:hidden;padding-bottom:25px;border-bottom:1px solid rgba(0,0,0,.1)}.list-layout_ngcontent-sc28 li_ngcontent-sc28:last-child{margin-bottom:0}.list-layout_ngcontent-sc28 li_ngcontent-sc28 a_ngcontent-sc28{color:#666;text-decoration:none}.list-layout_ngcontent-sc28 li_ngcontent-sc28 a_ngcontent-sc28:hover{text-decoration:none}.list-layout_ngcontent-sc28 li_ngcontent-sc28 .article-list-item_ngcontent-sc28 img_ngcontent-sc28{float:left;max-width:150px;height:auto}@media (max-width: 37.5em){.list-layout_ngcontent-sc28 li_ngcontent-sc28 .article-list-item_ngcontent-sc28 img_ngcontent-sc28{float:none;width:100%;height:auto;margin-bottom:10px;max-width:100%}}.list-layout_ngcontent-sc28 li_ngcontent-sc28 .article-list-item_ngcontent-sc28 .content_ngcontent-sc28{margin-left:170px}@media (max-width: 37.5em){.list-layout_ngcontent-sc28 li_ngcontent-sc28 .article-list-item_ngcontent-sc28 .content_ngcontent-sc28{margin-left:0}}.list-layout_ngcontent-sc28 li_ngcontent-sc28 .article-list-item_ngcontent-sc28 .content_ngcontent-sc28 .title_ngcontent-sc28{font-weight:800;color:#333;font-size:18px;margin-bottom:0}.list-layout_ngcontent-sc28 li_ngcontent-sc28 .article-list-item_ngcontent-sc28 .content_ngcontent-sc28 .text_ngcontent-sc28{font-style:italic;font-size:17px;color:#333;font-weight:300}.list-layout_ngcontent-sc28 li_ngcontent-sc28 .article-list-item_ngcontent-sc28 .content_ngcontent-sc28 .source_ngcontent-sc28{font-weight:600;text-transform:uppercase;color:#666;font-size:13px}.list-layout_ngcontent-sc28 li_ngcontent-sc28 .article-list-item_ngcontent-sc28 .content_ngcontent-sc28 .published_ngcontent-sc28{margin-right:3px;font-weight:600;color:#666;font-size:13px;text-transform:uppercase}.list-layout_ngcontent-sc28 li_ngcontent-sc28 .article-list-item.no-image_ngcontent-sc28 img_ngcontent-sc28{display:none}.list-layout_ngcontent-sc28 li_ngcontent-sc28 .article-list-item.no-image_ngcontent-sc28 .content_ngcontent-sc28{margin-left:0}/style>/head>body> style idnewsroom_styles>body{ font-family: Work Sans}.btn{ font-family: Work Sans}h1,h2,h3,h4,h5,h6{ font-family: Rubik}a{ color: #f07d00}a:hover{ color: #f07d00; opacity: 0.8;}.lSSlideOuter .lSPager.lSpg > li:hover a, .lSSlideOuter .lSPager.lSpg > li.active a { background-color: #f07d00 ;}.content-container h1 .seperator { background-color: #f07d00 ;}.navbar .nav-item .nav-link.active { border-color: #f07d00;}.view-more-button-container .btn { background: #f07d00;}.color-newsroom-accent-color{ color: #f07d00;}.bg-color-newsroom-accent-color{ background: #f07d00;}.item-list-boxed ul li .box .read-more-container{ background-color: #f07d00;}.item-list-boxed ul li .box .social-icons{ color: #f07d00;}.btn.btn-default { background-color: #f07d00; border-color: #f07d00; color: #fff; border-radius:2px;}.btn.btn-default:hover { background-color: #f07d00; border-color: #f07d00; color: #fff; opacity:0.5;}.newsroom-section-loader .circular, .newsroom-loader .circular{ stroke: #f07d00;}.item-list .list-no-items { background-color: #f07d00;}.modal .modal-dialog .modal-content { border-color: #f07d00;}.control-checkbox:hover input:not(disabled):checked ~ .indicator, .control-checkbox .control input:checked:focus ~ .indicator { background: #f07d00;}.control-checkbox input:checked:not(disabled) ~ .indicator { background: #f07d00;}.btn.btn-sm { padding: .25rem .5rem; font-size: .875rem; line-height: 1.5; border-radius: .2rem;}.btn{ font-size: 1rem; padding: .375rem .75rem;}.dropdown .dropdown-menu .dropdown-item.active,.dropup .dropdown-menu .dropdown-item.active { color: #f07d00}.cookie-consent-container{ background: #f07d00;}ngb-pagination .page-item.active .page-link { color: #fff; background-color: #f07d00; border-color: #f07d00; }ngb-pagination .page-link:hover { color: #f07d00;}.press-kit-card .media-list .dataobject-item .info-container { background-color: #f07d00;}/style> style idcustom_styles>/style> notified-newsroom _nghost-sc21 ng-version15.2.10 ng-server-contextother>router-outlet _ngcontent-sc21>/router-outlet>ng-component>!---->div classnewsroom-wrapper newsroom-frontpage>div classnewsroom-top-nav>nav idmain-navbar classnavbar navbar-expand-lg navbar-light bg-faded fixed-top>!---->a classnavbar-brand href/>img classimg-fluid srchttps://cdn.filestackcontent.com/auto_image/S2c1CK6TrmTpOkk75iwP altProVide Server logo>!---->/a>!---->button typebutton data-togglecollapse data-target#navbarSupportedContent aria-controlsnavbarSupportedContent aria-expandedfalse aria-labelToggle navigation classnavbar-toggler>span classnavbar-toggler-icon>/span>/button>div classcollapse navbar-collapse>button typebutton classmobile-toggle-cancel>i classicon-cancel-1>/i>/button>ul classnavbar-nav ml-auto>!---->li classnav-item>a routerlinkactiveactive classnav-link href/posts>News/a>/li>!---->li classnav-item>a routerlinkactiveactive classnav-link href/presskits>Content/a>/li>!---->li classnav-item>a routerlinkactiveactive classnav-link href/contacts>Contacts/a>/li>!---->li classnav-item>a classnav-link hrefhttps://www.provideserver.com>About ProVide/a>/li>!---->!---->!---->!---->!---->!---->!---->!---->li idfollow-button-menu classnav-item>button typebutton classbtn btn-default pr-4 pl-4>Follow/button>/li>/ul>/div>/nav>/div>!---->!---->div classnewsroom-content>router-outlet>/router-outlet>ng-component>div idfrontpage class>section class>!---->newsroom-header>div classnewsroom-hero-container>div classcontent>h1 classtitle stylecolor:#fff;>Own your data/h1>!---->hr classtitle-seperator styleborder-color:#fff;>!---->!---->div idfollow-button-header classbuttons-container>button classbtn btn-round btn-white stylecolor:rgb(255,255,255);background-color:rgb(240,125,0);>Follow/button>/div>/div>!---->div classimage-overlay stylebackground-color:rgba(0,0,0,0.5);>/div>!---->div classimage-container stylebackground-image:url(https://cdn.filestackcontent.com/gzWiCcSST5ed2kNmto7s);filter:blur(0px);>/div>!---->/div>!---->/newsroom-header>/section>!---->!---->!---->section class>!---->html-widget idwidget-52421 classwidget-container>div classcontent-container>div classcontainer>div classrow>div classcol-lg-12>h1>This is ProVide Server span classseperator>/span>/h1>!---->div classcompany-info-about pre-wrap>p>Welcome to our media center! This is where you will find articles that we find useful, news about intriguing developments in the industry, and cases where ProVide Server has been featured in the press. We keep an eye on news in system engineering, cyber security and file-transfering, driven by our enthusiasm for making file-transfering safe and easy./p>/div>/div>/div>/div>/div>!---->/html-widget>/section>!---->!---->!---->!---->!---->!---->!---->!---->!---->section class>!---->items-widget idwidget-51803 classodd widget-container>div classcontent-container>div classcontainer>div classrow>div classcol-lg-12>h1>Our articles span classseperator>/span>/h1>!---->!---->!---->div classview-more-button-container>button typebutton classbtn btn-read-more mr-2>View more/button>!---->!---->/div>!---->!---->!---->/div>/div>/div>/div>!---->/items-widget>/section>!---->!---->!---->!---->!---->!---->section class>!---->tag-based-items-widget _nghost-sc28 idwidget-51802 classwidget-container>div _ngcontent-sc28 classcontent-container>div _ngcontent-sc28 classcontainer>div _ngcontent-sc28 classrow>div _ngcontent-sc28 classcol-lg-12>h1 _ngcontent-sc28>Said about IT-security span _ngcontent-sc28 classseperator>/span>/h1>!---->!---->!---->!---->!---->div _ngcontent-sc28 classnewsroom-section-loader mb-0>svg _ngcontent-sc28 viewBox25 25 50 50 classcircular>circle _ngcontent-sc28 cx50 cy50 r20 fillnone stroke-width2 stroke-miterlimit10 classpath>/circle>/svg>/div>!---->!---->!---->/div>/div>/div>/div>!---->/tag-based-items-widget>/section>!---->!---->!---->!---->!---->!---->!---->section class>!---->contact-widget idwidget-51805 classodd widget-container>div classcontent-container>div classcontainer>div classrow>div classcol-lg-12>h1>Contacts span classseperator>/span>/h1>!---->div classcontacts-big-list>div classcontacts-list row>div classcol-lg-6 col-sm-12 col-xs-12 contact-col>div classcontact-item contact-col>img classcontact-image srchttps://cdn.filestackcontent.com/auto_image/cQGLIJArQf6PSFaMAkCE altCarina Sjövill>!---->div classcontact-info>div classtitle stylecolor:#f07d00;>Head of Marketing & Communications/div>!---->h5 classcontact-name> Carina Sjövill /h5>!---->!---->ul>li>i classicon-mail-1>/i>a classpointer hrefmailto:carina.sjovill@farsight.se>carina.sjovill@farsight.se/a>/li>!---->li>i classicon-phone>/i> +46 707396722 /li>!---->!---->!---->!---->!---->/ul>/div>/div>/div>div classcol-lg-6 col-sm-12 col-xs-12 contact-col>div classcontact-item contact-col>img classcontact-image srchttps://cdn.filestackcontent.com/auto_image/kQGLlGW5Tj6DVGA1k0zf altLeonid Zhevak>!---->div classcontact-info>div classtitle stylecolor:#f07d00;>Marketing & Communications Manager/div>!---->h5 classcontact-name> Leonid Zhevak /h5>!---->!---->ul>li>i classicon-mail-1>/i>a classpointer hrefmailto:leo.zhevak@farsight.se>leo.zhevak@farsight.se/a>/li>!---->!---->!---->!---->!---->!---->/ul>/div>/div>/div>!---->/div>/div>/div>/div>/div>/div>!---->/contact-widget>/section>!---->!---->!---->!---->!---->!---->!---->!---->!---->section class>!---->tag-based-items-widget _nghost-sc28 idwidget-51926 classwidget-container>div _ngcontent-sc28 classcontent-container>div _ngcontent-sc28 classcontainer>div _ngcontent-sc28 classrow>div _ngcontent-sc28 classcol-lg-12>h1 _ngcontent-sc28>Facebook span _ngcontent-sc28 classseperator>/span>/h1>!---->ul _ngcontent-sc28 idtag-slider-51926 classhidden>!---->/ul>!---->!---->!---->!---->!---->div _ngcontent-sc28 classnewsroom-section-loader mb-0>svg _ngcontent-sc28 viewBox25 25 50 50 classcircular>circle _ngcontent-sc28 cx50 cy50 r20 fillnone stroke-width2 stroke-miterlimit10 classpath>/circle>/svg>/div>!---->!---->!---->/div>/div>/div>/div>!---->/tag-based-items-widget>/section>!---->!---->!---->!---->!---->!---->!---->!---->!---->/div>/ng-component>!---->/div>div classpowered-by-footer>div classcontainer>div classrow justify-content-center>div classsubscribe-rss col-lg-6>div classicon-rss-1>Follow us/div>ul classrss-feed-list>li>a relnofollow target_blank classml-1 hrefhttps://api.client.notified.com/api/rss/publish/view/44194?typenews>News (RSS)/a>/li>li>a relnofollow target_blank classml-1 hrefhttps://api.client.notified.com/api/rss/publish/view/44194?typepress>Press releases (RSS)/a>/li>li>a relnofollow target_blank classml-1 hrefhttps://api.client.notified.com/api/rss/publish/view/44194?typeblog>Blog posts (RSS)/a>/li>/ul>/div>div classcol-lg-6>a hrefhttps://notified.com relnofollow target_blank>img src../../content/imgs/logos/logo_square.svg altNotified logo>Powered by Notified/a>/div>/div>/div>/div>/div>loader-container>!---->/loader-container>/ng-component>!---->/notified-newsroom> script srchttps://cdnjs.cloudflare.com/ajax/libs/limonte-sweetalert2/6.9.1/sweetalert2.min.js>/script> script srchttps://cdnjs.cloudflare.com/ajax/libs/jquery/3.5.0/jquery.min.js>/script> script srccontent/js/lightslider.min.js>/script> script srccontent/js/webfont.js>/script>script srcruntime.d8d7b20a66dbf5e1.js typemodule>/script>script srcpolyfills.21a690296e1f4fb9.js typemodule>/script>script srcmain.8079d9c3301456b5.js typemodule>/script>script idnotified-newsroom-state typeapplication/json>{&q;viewModelKey&q;:{&q;name&q;:&q;ProVide&q;,&q;sluggedName&q;:&q;provide&q;,&q;roomId&q;:44194,&q;isPublic&q;:true,&q;cameViaCustomDomain&q;:true,&q;googleAnalyticsTrackingId&q;:null,&q;googleAnalytics4TrackingId&q;:null,&q;googleAnalyticsDisabled&q;:false,&q;cookieConsentEnabled&q;:false,&q;googleSiteVerificationToken&q;:&q;OR0PHe12jGSiV1vmbTHggV0shaLfVYaSK-DjbVwR8dE&q;,&q;companyInfo&q;:{&q;publishRoomId&q;:44194,&q;about&q;:&q;ProVide Server combines a user-friendly web interface for user collaboration with powerful SFTP, FTPS and TFTP services. It allows all of your file transfers take place on your own private cloud, completely secure from the outside world.&q;,&q;name&q;:&q;ProVide Server&q;,&q;hostedNewsroomDomain&q;:&q;news.provideserver.com&q;},&q;roomSettings&q;:{&q;publishRoomId&q;:0,&q;logoUrl&q;:&q;https://cdn.filestackcontent.com/auto_image/S2c1CK6TrmTpOkk75iwP&q;,&q;mailLogoUrl&q;:&q;https://cdn.filestackcontent.com/auto_image/S2c1CK6TrmTpOkk75iwP&q;,&q;favIconUrl&q;:&q;https://cdn.filestackcontent.com/auto_image/fDiar0UQo25bupSvaLQU&q;,&q;accentColor&q;:&q;#f07d00&q;,&q;headerTitle&q;:&q;Own your data&q;,&q;headerSubtitle&q;:&q;&q;,&q;headerImageUrl&q;:&q;https://cdn.filestackcontent.com/gzWiCcSST5ed2kNmto7s&q;,&q;headerBlurLevel&q;:0,&q;headerTextColor&q;:&q;#fff&q;,&q;headerBackgroundColor&q;:&q;rgba(0,0,0,0.5)&q;,&q;headerFollowButtonBackgroundColor&q;:&q;rgb(240,125,0)&q;,&q;headerFollowButtonTextColor&q;:&q;rgb(255,255,255)&q;,&q;headerWidgetActive&q;:null,&q;headerWidgetSpeed&q;:null,&q;headerWidgetAutoplay&q;:null,&q;roomMenuEnabledHome&q;:false,&q;roomMenuEnabledNews&q;:true,&q;roomMenuEnabledContent&q;:true,&q;roomMenuEnabledContacts&q;:true,&q;customMenuItemUrl1&q;:&q;https://www.provideserver.com&q;,&q;customMenuItemName1&q;:&q;About ProVide&q;,&q;customMenuItemUrl2&q;:null,&q;customMenuItemName2&q;:null,&q;customMenuItemUrl3&q;:null,&q;customMenuItemName3&q;:null,&q;customMenuItemUrl4&q;:null,&q;customMenuItemName4&q;:null,&q;customMenuItemUrl5&q;:null,&q;customMenuItemName5&q;:null,&q;customMenuItemUrl6&q;:null,&q;customMenuItemName6&q;:null,&q;customMenuItemUrl7&q;:null,&q;customMenuItemName7&q;:null,&q;customMenuItemUrl8&q;:null,&q;customMenuItemName8&q;:null,&q;customCss&q;:null,&q;headingFontFamily&q;:{&q;type&q;:&q;googleFont&q;,&q;fontName&q;:&q;Rubik&q;,&q;externalId&q;:&q;Rubik&q;,&q;cssSelector&q;:&q;Rubik&q;},&q;paragraphFontFamily&q;:{&q;type&q;:&q;googleFont&q;,&q;fontName&q;:&q;Work Sans&q;,&q;externalId&q;:&q;Work Sans&q;,&q;cssSelector&q;:&q;Work Sans&q;},&q;typeKitId&q;:null,&q;logoHref&q;:null},&q;publishRoomLabel&q;:{&q;language&q;:&q;english&q;,&q;publishRoomId&q;:44194,&q;pressRelease&q;:&q;Press release&q;,&q;pressReleases&q;:&q;Press releases&q;,&q;regulatoryPressRelease&q;:&q;Regulatory press release&q;,&q;regulatoryPressReleases&q;:&q;Regulatory press releases&q;,&q;readMore&q;:&q;Read more&q;,&q;readAllPressReleases&q;:&q;Read all press releases&q;,&q;about&q;:&q;About&q;,&q;home&q;:&q;Home&q;,&q;content&q;:&q;Content&q;,&q;contacts&q;:&q;Contacts&q;,&q;readAllBlogPosts&q;:&q;Read all blog posts&q;,&q;viewMore&q;:&q;View more&q;,&q;view&q;:&q;View&q;,&q;news&q;:&q;News&q;,&q;blogPosts&q;:&q;Blog posts&q;,&q;blogPost&q;:&q;Blog post&q;,&q;newsPost&q;:&q;News post&q;,&q;newsPosts&q;:&q;News posts&q;,&q;latestNews&q;:&q;Latest news&q;,&q;topics&q;:&q;Topics&q;,&q;newsTypes&q;:&q;News types&q;,&q;noMoreItems&q;:&q;No more news&q;,&q;relatedLinks&q;:&q;Related links&q;,&q;relatedFiles&q;:&q;Related media&q;,&q;relatedPressKits&q;:&q;Related press kits&q;,&q;relatedPosts&q;:&q;Related news&q;,&q;download&q;:&q;Download&q;,&q;fileType&q;:&q;File type&q;,&q;license&q;:&q;License&q;,&q;size&q;:&q;Size&q;,&q;follow&q;:&q;Follow&q;,&q;name&q;:&q;Name&q;,&q;yourEmailAddress&q;:&q;Your email address&q;,&q;privacyConcent&q;:&q;I agree that my personal data will be processed in accordance with the Privacy Policy.&q;,&q;privacyText&q;:&q;We’re committed to your privacy. The newsroom owner and Notified use the information you provide to us to contact you about our relevant content&q;,&q;enterMailText&q;:&q;Enter your e-mail and name to start receiving news from&q;,&q;sendingConfirmMailText&q;:&q;We&s;re sending confirm mail to your email&q;,&q;verifyMailText&q;:&q;Look for the verification email in your inbox and click the link in that email. A confirmation message will appear in your web browser.&q;,&q;mailShareTitle&q;:&q;Share this post on social media&q;,&q;allTopics&q;:&q;All topics&q;,&q;allYears&q;:&q;All years&q;,&q;allMonths&q;:&q;All months&q;,&q;january&q;:&q;January&q;,&q;february&q;:&q;February&q;,&q;march&q;:&q;March&q;,&q;april&q;:&q;April&q;,&q;may&q;:&q;May&q;,&q;june&q;:&q;June&q;,&q;july&q;:&q;July&q;,&q;august&q;:&q;August&q;,&q;september&q;:&q;September&q;,&q;october&q;:&q;October&q;,&q;november&q;:&q;November&q;,&q;december&q;:&q;December&q;,&q;noItemsExist&q;:&q;There are no news posts that match your filter or search.&q;,&q;emailIsRequired&q;:&q;Email is required&q;,&q;invalidEmail&q;:&q;Invalid email&q;,&q;unsubscribePrivacyPolicy&q;:&q;You may unsubscribe from these communications at any time. For more information, please read our&q;,&q;privacyPolicy&q;:&q;Privacy Policy.&q;,&q;tickToFollow&q;:&q;You need to tick this box to be able to follow newsroom.&q;,&q;close&q;:&q;Close&q;,&q;cookieConsentDescription&q;:&q;Notified&s;s websites use cookies to ensure that we give you the best experience when you visit our websites or use our Services. If you continue without changing your browser settings, you are agreeing to our use of cookies. Find out more by reading our &l;a href&s;https://www.intrado.com/en/legal-privacy&s;&g;privacy policy&l;/a&g;&q;,&q;accept&q;:&q;Accept&q;,&q;reject&q;:&q;Reject&q;,&q;photographer&q;:&q;Photographer&q;},&q;customFonts&q;:,&q;gnwPressReleaseFeedUrl&q;:null,&q;hasRegulatoryPressReleases&q;:false},&q;frontPageKey&q;:{&q;featuredItems&q;:,&q;widgets&q;:{&q;id&q;:51800,&q;publishRoomId&q;:44194,&q;title&q;:&q;Featured press releases&q;,&q;widgetType&q;:&q;featuredItemsWidget&q;,&q;tagWidgetRenderType&q;:null,&q;tagWidgetItemCount&q;:null,&q;tagWidgetTagIds&q;:,&q;tagWidgetSearchProfileIds&q;:,&q;tagWidgetSearchProfilePostTypes&q;:,&q;tagWidgetLoadMore&q;:false,&q;featuredItemsWidgetSpeed&q;:5,&q;featuredItemsWidgetAutoplay&q;:true,&q;htmlWidgetHtml&q;:null,&q;sortOrder&q;:1,&q;isEnabled&q;:false,&q;itemWidgetRenderType&q;:&q;box&q;,&q;itemWidgetItemTypes&q;:,&q;itemWidgetItemCount&q;:0,&q;itemWidgetTopicIds&q;:,&q;itemWidgetLoadMore&q;:false},{&q;id&q;:51801,&q;publishRoomId&q;:44194,&q;title&q;:&q;Said about ProVide&q;,&q;widgetType&q;:&q;itemsWidget&q;,&q;tagWidgetRenderType&q;:null,&q;tagWidgetItemCount&q;:null,&q;tagWidgetTagIds&q;:,&q;tagWidgetSearchProfileIds&q;:,&q;tagWidgetSearchProfilePostTypes&q;:,&q;tagWidgetLoadMore&q;:false,&q;featuredItemsWidgetSpeed&q;:null,&q;featuredItemsWidgetAutoplay&q;:false,&q;htmlWidgetHtml&q;:null,&q;sortOrder&q;:7,&q;isEnabled&q;:false,&q;itemWidgetRenderType&q;:&q;box&q;,&q;itemWidgetItemTypes&q;:&q;blog&q;,&q;news&q;,&q;pressRelease&q;,&q;itemWidgetItemCount&q;:6,&q;itemWidgetTopicIds&q;:,&q;itemWidgetLoadMore&q;:false},{&q;id&q;:51802,&q;publishRoomId&q;:44194,&q;title&q;:&q;Said about IT-security&q;,&q;widgetType&q;:&q;tagBasedItemWidget&q;,&q;tagWidgetRenderType&q;:&q;masonry&q;,&q;tagWidgetItemCount&q;:6,&q;tagWidgetTagIds&q;:34584,34567,34568,34582,&q;tagWidgetSearchProfileIds&q;:,&q;tagWidgetSearchProfilePostTypes&q;:,&q;tagWidgetLoadMore&q;:true,&q;featuredItemsWidgetSpeed&q;:null,&q;featuredItemsWidgetAutoplay&q;:false,&q;htmlWidgetHtml&q;:null,&q;sortOrder&q;:4,&q;isEnabled&q;:true,&q;itemWidgetRenderType&q;:&q;box&q;,&q;itemWidgetItemTypes&q;:,&q;itemWidgetItemCount&q;:0,&q;itemWidgetTopicIds&q;:,&q;itemWidgetLoadMore&q;:false},{&q;id&q;:51803,&q;publishRoomId&q;:44194,&q;title&q;:&q;Our articles&q;,&q;widgetType&q;:&q;itemsWidget&q;,&q;tagWidgetRenderType&q;:null,&q;tagWidgetItemCount&q;:null,&q;tagWidgetTagIds&q;:,&q;tagWidgetSearchProfileIds&q;:,&q;tagWidgetSearchProfilePostTypes&q;:,&q;tagWidgetLoadMore&q;:false,&q;featuredItemsWidgetSpeed&q;:null,&q;featuredItemsWidgetAutoplay&q;:false,&q;htmlWidgetHtml&q;:null,&q;sortOrder&q;:2,&q;isEnabled&q;:true,&q;itemWidgetRenderType&q;:&q;masonry&q;,&q;itemWidgetItemTypes&q;:&q;blog&q;,&q;news&q;,&q;pressRelease&q;,&q;itemWidgetItemCount&q;:6,&q;itemWidgetTopicIds&q;:,&q;itemWidgetLoadMore&q;:true},{&q;id&q;:51805,&q;publishRoomId&q;:44194,&q;title&q;:&q;Contacts&q;,&q;widgetType&q;:&q;contactWidget&q;,&q;tagWidgetRenderType&q;:null,&q;tagWidgetItemCount&q;:null,&q;tagWidgetTagIds&q;:,&q;tagWidgetSearchProfileIds&q;:,&q;tagWidgetSearchProfilePostTypes&q;:,&q;tagWidgetLoadMore&q;:false,&q;featuredItemsWidgetSpeed&q;:null,&q;featuredItemsWidgetAutoplay&q;:false,&q;htmlWidgetHtml&q;:null,&q;sortOrder&q;:5,&q;isEnabled&q;:true,&q;itemWidgetRenderType&q;:&q;box&q;,&q;itemWidgetItemTypes&q;:,&q;itemWidgetItemCount&q;:0,&q;itemWidgetTopicIds&q;:,&q;itemWidgetLoadMore&q;:false},{&q;id&q;:51926,&q;publishRoomId&q;:44194,&q;title&q;:&q;Facebook&q;,&q;widgetType&q;:&q;tagBasedItemWidget&q;,&q;tagWidgetRenderType&q;:&q;carousel&q;,&q;tagWidgetItemCount&q;:9,&q;tagWidgetTagIds&q;:,&q;tagWidgetSearchProfileIds&q;:116272,&q;tagWidgetSearchProfilePostTypes&q;:,&q;tagWidgetLoadMore&q;:false,&q;featuredItemsWidgetSpeed&q;:null,&q;featuredItemsWidgetAutoplay&q;:false,&q;htmlWidgetHtml&q;:null,&q;sortOrder&q;:6,&q;isEnabled&q;:true,&q;itemWidgetRenderType&q;:&q;box&q;,&q;itemWidgetItemTypes&q;:,&q;itemWidgetItemCount&q;:0,&q;itemWidgetTopicIds&q;:,&q;itemWidgetLoadMore&q;:false},{&q;id&q;:52421,&q;publishRoomId&q;:44194,&q;title&q;:&q;This is ProVide Server&q;,&q;widgetType&q;:&q;htmlWidget&q;,&q;tagWidgetRenderType&q;:null,&q;tagWidgetItemCount&q;:null,&q;tagWidgetTagIds&q;:,&q;tagWidgetSearchProfileIds&q;:,&q;tagWidgetSearchProfilePostTypes&q;:,&q;tagWidgetLoadMore&q;:false,&q;featuredItemsWidgetSpeed&q;:null,&q;featuredItemsWidgetAutoplay&q;:false,&q;htmlWidgetHtml&q;:&q;&l;p&g;Welcome to our media center! This is where you will find articles that we find useful, news about intriguing developments in the industry, and cases where ProVide Server has been featured in the press. We keep an eye on news in system engineering, cyber security and file-transfering, driven by our enthusiasm for making file-transfering safe and easy.&l;/p&g;&q;,&q;sortOrder&q;:0,&q;isEnabled&q;:true,&q;itemWidgetRenderType&q;:&q;box&q;,&q;itemWidgetItemTypes&q;:,&q;itemWidgetItemCount&q;:0,&q;itemWidgetTopicIds&q;:,&q;itemWidgetLoadMore&q;:false},{&q;id&q;:52454,&q;publishRoomId&q;:44194,&q;title&q;:&q;Said about ProVide&q;,&q;widgetType&q;:&q;tagBasedItemWidget&q;,&q;tagWidgetRenderType&q;:&q;masonry&q;,&q;tagWidgetItemCount&q;:6,&q;tagWidgetTagIds&q;:,&q;tagWidgetSearchProfileIds&q;:104671,&q;tagWidgetSearchProfilePostTypes&q;:,&q;tagWidgetLoadMore&q;:true,&q;featuredItemsWidgetSpeed&q;:null,&q;featuredItemsWidgetAutoplay&q;:false,&q;htmlWidgetHtml&q;:null,&q;sortOrder&q;:3,&q;isEnabled&q;:false,&q;itemWidgetRenderType&q;:&q;box&q;,&q;itemWidgetItemTypes&q;:,&q;itemWidgetItemCount&q;:0,&q;itemWidgetTopicIds&q;:,&q;itemWidgetLoadMore&q;:false},&q;contacts&q;:{&q;id&q;:44066,&q;name&q;:&q;Leonid Zhevak&q;,&q;sortOrder&q;:2,&q;title&q;:&q;Marketing &a; Communications Manager&q;,&q;description&q;:null,&q;picture&q;:&q;https://cdn.filestackcontent.com/auto_image/kQGLlGW5Tj6DVGA1k0zf&q;,&q;email&q;:&q;leo.zhevak@farsight.se&q;,&q;phone&q;:null,&q;phone2&q;:null,&q;twitterHandle&q;:null,&q;instagramUsername&q;:null,&q;linkedInUsername&q;:&q;leonid-zhevak-7a815910b&q;,&q;enabledInNewsroom&q;:true},{&q;id&q;:43507,&q;name&q;:&q;Carina Sjövill&q;,&q;sortOrder&q;:1,&q;title&q;:&q;Head of Marketing &a; Communications&q;,&q;description&q;:null,&q;picture&q;:&q;https://cdn.filestackcontent.com/auto_image/cQGLIJArQf6PSFaMAkCE&q;,&q;email&q;:&q;carina.sjovill@farsight.se&q;,&q;phone&q;:&q;+46 707396722&q;,&q;phone2&q;:null,&q;twitterHandle&q;:null,&q;instagramUsername&q;:null,&q;linkedInUsername&q;:&q;carinasjovill/&q;,&q;enabledInNewsroom&q;:true}},&q;itemsKey-51803&q;:{&q;items&q;:{&q;id&q;:191388,&q;title&q;:&q;Curiosity killed the cat&q;,&q;summary&q;:&q;Social engineering you might have heard of. But be honest - do You know what a Road Apple is, and what kind of threat it poses? And more importantl...&q;,&q;description&q;:&q;&l;p&g;&l;em&g;&l;strong&g;Ever heard of \&q;Road Apples\&q;? And no - we&s;re not relating to a piece of horse droppings at the side of a road. These \&q;apples\&q; are far more dangerous.&l;/strong&g;&l;/em&g;&l;/p&g;\n&l;h2&g;The sad truth about security&l;/h2&g;\n&l;p id\&q;6023\&q; data-selectable-paragraph\&q;\&q;&g;Security is only as strong as its weakest link. Unfortunately, most of the time, people are the weakest link. You may have spent a fortune on hight-tech security, state of the art firewalls, complex remote access frameworks and access passes to even enter the building. But be honest - do You know what a Road Apple&a;nbsp;is, and what kind of threat it poses? And more importantly, &l;strong&g;do your employees know?&l;/strong&g;&l;/p&g;\n&l;h2&g;A game of trust and fear&a;nbsp;&l;/h2&g;\n&l;p data-selectable-paragraph\&q;\&q;&g;Let&s;s cover the basics first. &l;a href\&q;https://www.techtarget.com/searchsecurity/definition/social-engineering\&q; target\&q;_blank\&q; rel\&q;nofollow noopener ugc\&q;&g;Social Engineering&l;/a&g; in general manipulates people into sharing sensitive data, like logins and payment information. This is done by tricking the target into handing over information, usually done by posing as someone trustworthy: a colleague, a janitor or a governmental/authority person. By playing emotions like fear and trust they exploit human error to deceive their victims, and thus gaining access to valuable and sensitive information.&l;/p&g;\n&l;p data-selectable-paragraph\&q;\&q;&g;&l;img style\&q;max-width: 100%; height: auto;\&q; src\&q;https://cdn.filestackcontent.com/xrUFXLtURNKpo3i6afwQ\&q; alt\&q;A younger man with a full beard stands with a orange building helmet in his hand, wearing carpender pants. \&q; /&g;&l;/p&g;\n&l;p data-selectable-paragraph\&q;\&q;&g;They might call you on the phone posing as a representative from your bank, they may send you an email claiming to be a colleague from another office abroad, or they may even knock on your door saying they are there to fix the ventilation. A well-planned social engineering attack can totally wreck an organization.&a;nbsp;&l;/p&g;\n&l;h2&g;Road Apples - the modern Trojan Horse&l;/h2&g;\n&l;p id\&q;23e1\&q; data-selectable-paragraph\&q;\&q;&g;A more \&q;creative\&q; type of social engineering attack, based on human curiosity, are&l;a href\&q;https://medium.com/@hacksoftwaredelhi/beware-of-the-road-apple-attack-54f7994ed6b0\&q; target\&q;_blank\&q; rel\&q;noopener\&q;&g;&a;nbsp;Road Apples&l;/a&g; - a social engineering attack based on a &l;a href\&q;https://en.wikipedia.org/wiki/Trojan_horse_(computing)\&q; target\&q;_blank\&q; rel\&q;noopener\&q;&g;Trojan Horse&l;/a&g; type of attack. In a typical Road Apple attack, a cyber criminal takes a device - for instance a USB memory stick - and taints it with &l;a href\&q;https://en.wikipedia.org/wiki/Malware\&q; target\&q;_blank\&q; rel\&q;noopener\&q;&g;malware&l;/a&g;. They then present the tainted USB memory stick (in this case) to the public, and waits for someone to take the bait.&a;nbsp;&l;/p&g;\n&l;p data-selectable-paragraph\&q;\&q;&g;&l;img style\&q;max-width: 100%; height: auto;\&q; src\&q;https://cdn.filestackcontent.com/5y4Xl06sTS2atMqU0S9i\&q; alt\&q;A USB memory stick inside a clear glass bottle on a pebble beach.\&q; /&g;&l;/p&g;\n&l;p id\&q;b1c6\&q; data-selectable-paragraph\&q;\&q;&g;Usually some worker in the targeted organization will see the USB memory stick (or Road Apple) on the ground, table or floor where it was left. Then curiosity to investigate the content of the USB memory stick, and perhaps return it to its rightful owner, makes the worker carry the tainted device into the office and insert it into his/hers computer, executing the malware either by tapping on it or having it automatically executed. Straight through all your fancy security solutions!&l;/p&g;\n&l;h2&g;The weakest link&l;/h2&g;\n&l;p data-selectable-paragraph\&q;\&q;&g;Your security might look solid, but if the people are not aware and educated regarding the types of attacks used, it is all pointless. Stay well educated, stay alert, and take care out there!&l;/p&g;&q;,&q;companyAbout&q;:&q;&l;p style\&q;white-space: pre-wrap; font-size: 17px; margin-bottom: 0; font-style: italic;\&q;&g;ProVide Server combines a user-friendly web interface for user collaboration with powerful SFTP, FTPS and TFTP services. It allows all of your file transfers take place on your own private cloud, completely secure from the outside world.&l;/p&g;&q;,&q;canonicalUrl&q;:null,&q;imageUrl&q;:&q;https://cdn.filestackcontent.com/auto_image/47ZwV69JSiuRpL9wT0sb&q;,&q;imageDescription&q;:&q;Ever heard of \&q;Road Apples\&q;?&q;,&q;imageAlt&q;:&q;A white backbround and a red and yellow apple with a black USB memory stick sticking out of it.&q;,&q;published&q;:&q;2022-10-20T10:54:00.000Z&q;,&q;created&q;:&q;2022-10-20T10:54:00&q;,&q;sluggedName&q;:&q;curiosity-killed-the-cat&q;,&q;isFeatured&q;:false,&q;language&q;:&q;en&q;,&q;status&q;:&q;active&q;,&q;type&q;:&q;blog&q;,&q;contacts&q;:,&q;topics&q;:,&q;relatedContent&q;:,&q;publishUrl&q;:&q;news.provideserver.com/posts/blogposts/curiosity-killed-the-cat&q;},{&q;id&q;:191387,&q;title&q;:&q;In the hands of an IT consultant&q;,&q;summary&q;:&q;Is your organization is at the start of an exciting digital project, or maby you need cutting-edge expertise to move forward - time to bring in a c...&q;,&q;description&q;:&q;&l;p&g;&l;strong&g;Your organization is at the start of an exciting project, maybe you need cutting-edge digital expertise to move forward? &l;a title\&q;time to bring in a consultant\&q; href\&q;https://www.farsight.se/en/services/consultants/\&q; target\&q;_blank\&q; rel\&q;noopener\&q;&g;Time to bring in a consultant&l;/a&g;! &l;/strong&g;&l;/p&g;\n&l;h2&g;Bring him/her on!&l;/h2&g;\n&l;p&g;With the right &l;a title\&q;consultant\&q; href\&q;https://en.wikipedia.org/wiki/Consultant\&q; target\&q;_blank\&q; rel\&q;noopener\&q;&g;IT consultant&l;/a&g; at the right place, you can add the skills your business lacks when they need it for as long as you need it. It fills the gap, so to speak. Someone who has experience, who has done the same thing many times before but also is up to date with the latest skills available in the market is a true asset. Bringing on consulting help can indeed be a cost-effective way to grow your business. &a;nbsp;&l;/p&g;\n&l;p style\&q;text-align: center;\&q;&g;&l;img style\&q;max-width: 100%; height: auto;\&q; src\&q;https://cdn.filestackcontent.com/XTiGQYloTKuqO7RBeVOe\&q; alt\&q;White young male in front of computer screen programming\&q; /&g;&l;/p&g;\n&l;h2&g;3 important things&l;/h2&g;\n&l;p&g;Here are four important things to consider when choosing the right IT consultant for your business:&l;/p&g;\n&l;p&g;&l;strong&g;&a;bull; Same same, but different -&l;/strong&g; The consultant should be valued as highly as any other employee and should be treated as one. Including them in the day-to-day activities in the company helps them feel right at home, even if he/she is there only for a specific assignment and a limited time.&a;nbsp;&l;/p&g;\n&l;p&g;&l;strong&g;&a;bull; Move in the same direction -&l;/strong&g; In order to make the most of the time the consultant has in your organization, it&s;s important to be clear about goals and expectations and at the same time provide the right conditions. So make sure you have talked through all aspects of the project beforehand, so that both parties are moving in the same direction.&l;/p&g;\n&l;p&g;&l;strong&g;&a;bull; Use a consulting company -&l;/strong&g; If you know what you and your organization need, but don&s;t know exactly how to choose your consultant - don&s;t bring in the consultant yourself, but buy the service! The consulting company is guaranteed to have a larger and better network, and a good consulting company is responsive and listens to your wishes and specifications. They will see your present and also upcoming needs for that specific project, and assign a proper consultant that will get the job done.&a;nbsp;&l;/p&g;\n&l;h2&g;No \&q;one-size-fits-all\&q;-solutions&l;/h2&g;\n&l;p&g;When looking for a good &l;a title\&q;consultant\&q; href\&q;https://en.wikipedia.org/wiki/Consultant\&q; target\&q;_blank\&q; rel\&q;noopener\&q;&g;consultant&l;/a&g; company you want &l;a title\&q;customized solutions\&q; href\&q;https://www.farsight.se/en/services/\&q; target\&q;_blank\&q; rel\&q;noopener\&q;&g;a firm that doesn&s;t deliver &l;em&g;\&q;one-size-fits-all\&q;-&l;/em&g;solutions.&l;/a&g; You want to find the best possible solution for your business, a solution that is going to be customized to you and your needs, and one that is able to evolve with you as you grow. Make sure that what you want is what you get!&l;/p&g;&q;,&q;companyAbout&q;:&q;&l;p style\&q;white-space: pre-wrap; font-size: 17px; margin-bottom: 0; font-style: italic;\&q;&g;ProVide Server combines a user-friendly web interface for user collaboration with powerful SFTP, FTPS and TFTP services. It allows all of your file transfers take place on your own private cloud, completely secure from the outside world.&l;/p&g;&q;,&q;canonicalUrl&q;:null,&q;imageUrl&q;:&q;https://cdn.filestackcontent.com/auto_image/4N2oOksShyPasoqD5Acw&q;,&q;imageDescription&q;:&q;Evolving your business? Time to bring in a consultant!&q;,&q;imageAlt&q;:&q;Two while men sitting in an office lounge area, discussing. &q;,&q;published&q;:&q;2022-09-06T10:52:00.000Z&q;,&q;created&q;:&q;2022-09-06T10:52:00&q;,&q;sluggedName&q;:&q;in-the-hands-of-an-it-consultant&q;,&q;isFeatured&q;:false,&q;language&q;:&q;en&q;,&q;status&q;:&q;active&q;,&q;type&q;:&q;blog&q;,&q;contacts&q;:,&q;topics&q;:,&q;relatedContent&q;:,&q;publishUrl&q;:&q;news.provideserver.com/posts/blogposts/in-the-hands-of-an-it-consultant&q;},{&q;id&q;:191382,&q;title&q;:&q;We remember the Texas Ransomware Attack&q;,&q;summary&q;:&q;It has now been three years since 22 towns across Texas U.S. were exposed to one of the largest ransomware attacks ever in the U.S. Governor Greg A...&q;,&q;description&q;:&q;&l;p&g;&l;strong&g;It has now been three years since 22 towns across Texas U.S. were exposed to one of the largest &l;a title\&q;Ransomware\&q; href\&q;https://www.trellix.com/en-us/security-awareness/ransomware/what-is-ransomware.html\&q; target\&q;_blank\&q; rel\&q;noopener\&q;&g;ransomware&l;/a&g; attacks ever in the U.S. &l;a title\&q;Governor Greg Abbott \&q; href\&q;https://www.texastribune.org/2020/05/31/texas-greg-abbott-state-disaster-george-floyd/\&q; target\&q;_blank\&q; rel\&q;noopener\&q;&g;Governor Greg Abbott declared the incident a statewide disaster and the first of it&s;s kind,&l;/a&g; but what really happened?&l;/strong&g;&l;/p&g;\n&l;h1&g;\&q;Give us the money, or else\&q;...&l;/h1&g;\n&l;p&g;Ransomeware is exactly what it sounds like - a &l;a title\&q;malware\&q; href\&q;https://www.techtarget.com/searchsecurity/definition/malware\&q; target\&q;_blank\&q; rel\&q;noopener\&q;&g;malware&l;/a&g; virus that hold a victim&a;rsquo;s information at ransom. An organization&a;rsquo;s valuable data is held hostage by cybercriminals. By encrypting the data the organization cannot access files, databases, or applications. A ransom is then demanded, i order to regain access. &a;nbsp;&l;/p&g;\n&l;h1&g;What happened?&l;/h1&g;\n&l;p&g;August back in 2019 in Texas, workers culd not access files or documents and printers spewed out demands for money. Town residents couldn&s;t pay water bills, governments couldn&s;t pay salaries and police officers had problems retrieving records, birth and death certificates etc. All across Texas, similar scenes played out at the same time.&l;/p&g;\n&l;p&g;&l;img style\&q;max-width: 100%; height: auto;\&q; src\&q;https://cdn.filestackcontent.com/fRf7gw6WSQmQdmyHTtIg\&q; alt\&q;A desert landscape and a \&q; /&g;&l;/p&g;\n&l;p&g;The attack was finally tied to a Russia-based criminal syndicate, and involved the &l;a title\&q;REvil/Sodinokibi\&q; href\&q;https://heimdalsecurity.com/blog/sodinokibi-ransomware-101/\&q; target\&q;_blank\&q; rel\&q;noopener\&q;&g;REvil/Sodinokibi&l;/a&g; ransomware. The attack was first initiated due to a small managed service provider&s;s remote access software had been compromised. This particular small managed service provider sustained irreparable damage, and it shows some of the devastating consequences that may follow in the footsteps of ransomware.&l;/p&g;\n&l;blockquote&g;\n&l;p&g;&l;em&g;&l;strong&g;...\&q;Customers lost and lost trust, is not easy to recover from. .\&q;&l;/strong&g;&l;/em&g;&l;/p&g;\n&l;/blockquote&g;\n&l;p&g;Some small business were also effected by the attack, and they testify of lost customers due to the cyber attack. Many of the customers had been with companies for a long period of time - beautiful customer relationships that had been built and nurtured over decades. But when the ransomware attack broke their digital security, a trust had been broken too and some damage is just to hard to repair. Customers lost and lost trust, is not easy to recover from.&l;/p&g;\n&l;h1&g;Planning in advance equals a quick recovery&l;/h1&g;\n&l;p&g;Overall though the cities affected during the attack recovered quite quickly over the next couple of days. This was much due to the preparation that Texas had done in advance. The key here was planning and practicing recovering from a major cyber attack - such as this one.&l;/p&g;\n&l;p&g;It took a large number of people dedicated to this particular incident to find a cure to this virus attack. This included people out in the field, people in the security operations center and analysts going from city to city trying to repair the damage.&l;/p&g;\n&l;h1&g;Is it worth it?&l;/h1&g;\n&l;p&g;In the aftermath of the Texas ransomware attack of 2019 the cost of the scenario described above is too high. Loosing data, customers, a community not functioning is a price not worth paying. In order to avoid paying that price online security is now more than ever a must. &l;a title\&q;Farsight would be happy to help!\&q; href\&q;https://www.farsight.se/en/services/\&q; target\&q;_blank\&q; rel\&q;noopener\&q;&g;The price for being digitally safe however, is an investment well worth the cost!&l;/a&g; Prioritizing security is an important key to a fully functional and safe workplace.&l;/p&g;\n&l;p&g;&l;img style\&q;max-width: 100%; height: auto;\&q; src\&q;https://cdn.filestackcontent.com/kEDyACwTb23WXwBlqGQg\&q; alt\&q;Printed charts in blue on a flat surface, and a calculator on top of them spelling \&q; /&g;&l;/p&g;\n&l;p&g;If the Texas ransomware attack has thaught us anything it is that there are still to this day big gaps in cyber defenses, and that we must expect more attack like this in the future.&l;/p&g;&q;,&q;companyAbout&q;:&q;&l;p style\&q;white-space: pre-wrap; font-size: 17px; margin-bottom: 0; font-style: italic;\&q;&g;ProVide Server combines a user-friendly web interface for user collaboration with powerful SFTP, FTPS and TFTP services. It allows all of your file transfers take place on your own private cloud, completely secure from the outside world.&l;/p&g;&q;,&q;canonicalUrl&q;:null,&q;imageUrl&q;:&q;https://cdn.filestackcontent.com/auto_image/dO1Q5FOeTEy28Ik4VKlp&q;,&q;imageDescription&q;:&q;&q;,&q;imageAlt&q;:&q;Green ones and zeros on a computer with the text \&q;RANSOMEWARE\&q; highlighted in orange. The letter \&q;RANSOM\&q; are cut out from a nesapaper and sits in front. &q;,&q;published&q;:&q;2022-08-16T10:49:00.000Z&q;,&q;created&q;:&q;2022-08-16T10:49:00&q;,&q;sluggedName&q;:&q;we-remember-the-texas-ransomware-attack&q;,&q;isFeatured&q;:false,&q;language&q;:&q;en&q;,&q;status&q;:&q;active&q;,&q;type&q;:&q;blog&q;,&q;contacts&q;:,&q;topics&q;:,&q;relatedContent&q;:,&q;publishUrl&q;:&q;news.provideserver.com/posts/blogposts/we-remember-the-texas-ransomware-attack&q;},{&q;id&q;:191381,&q;title&q;:&q;Trendy cyber security threats of 2022 - so far&q;,&q;summary&q;:&q;What&s;s hot and what&s;s not, in the digital virus world? What&s;s trendy when it comes to hackerattacks and cybercrimes? Cyber security threats sure ha...&q;,&q;description&q;:&q;&l;p&g;&l;strong&g;&l;em&g;What&s;s hot and what&s;s not, &l;/em&g;in the digital virus world? What&s;s trendy when it comes to hackerattacks and cybercrimes? Cyber security threats sure hasn&s;t got its own fashion week, but it follows trends never the less, and you are wise to keep an eye on the them. &l;a title\&q;Heidi Klum\&q; href\&q;https://www.youtube.com/watch?v64jST_wDAME&a;amp;ab_channelHar\&q; target\&q;_blank\&q; rel\&q;noopener\&q;&g;Either you&s;re in or you&s;re out - to quote a famous runway model.&l;/a&g;&l;/strong&g;&l;/p&g;\n&l;p&g;&a;nbsp;&l;/p&g;\n&l;h2&g;&l;span style\&q;color: #000000;\&q;&g;&l;span style\&q;font-size: 36pt;\&q;&g;Define the illness - find the cure&l;/span&g;&l;/span&g;&l;/h2&g;\n&l;p&g;&l;span style\&q;color: #000000;\&q;&g;Knowing the threat might help you prevent cyber security attacks from totally wrecking your organization. &l;/span&g;&l;/p&g;\n&l;p&g;&l;span style\&q;color: #000000;\&q;&g;&a;ldquo;Viruses&a;rdquo; are a common moniker for a number of cyber threats. However, sometimes we need to define more closely what has caused the illness &a;ndash; just like when we get ill in real life.&l;/span&g;&l;/p&g;\n&l;p&g;&l;span style\&q;color: #000000;\&q;&g; &l;img style\&q;max-width: 100%; height: auto;\&q; src\&q;https://cdn.filestackcontent.com/cconIEJTfmDx1OnX5kHU\&q; alt\&q;\&q; /&g;&l;/span&g;&l;/p&g;\n&l;h2&g;&l;span style\&q;color: #000000;\&q;&g;\&q;The List\&q;&l;/span&g;&l;/h2&g;\n&l;p&g;&l;span style\&q;color: #000000;\&q;&g;So, without further ado, here are the most common cyber security threats as of 2022, so far. And some tips of how you can defend your business from them:&l;/span&g;&l;/p&g;\n&l;h4&g;&l;span style\&q;color: #000000;\&q;&g;&l;strong&g;1. Malware&l;/strong&g;&l;/span&g;&l;/h4&g;\n&l;p&g;&l;span style\&q;color: #000000;\&q;&g;&l;a style\&q;color: #000000;\&q; title\&q;Maleware\&q; href\&q;https://www.techtarget.com/searchsecurity/definition/malware\&q; target\&q;_blank\&q; rel\&q;noopener\&q;&g;&l;strong&g;Malware&l;/strong&g;&l;/a&g; is one of the most common cyber security threats. Malware is short for &a;ldquo;Malicious Software&a;rdquo;, and it also goes by other names such as &a;ldquo;worms,&a;rdquo; &a;ldquo;spyware,&a;rdquo; &a;ldquo;ransomware,&a;rdquo; and &a;ldquo;viruses.&a;rdquo;&l;/span&g;&l;/p&g;\n&l;p&g;&l;span style\&q;color: #000000;\&q;&g;Malware is normally activated when you click on a link or on an attachment that contains the virus. The bad link then starts to install on your computer, leading to further trouble such as:&l;/span&g;&l;/p&g;\n&l;ul&g;\n&l;li&g;&l;span style\&q;color: #000000;\&q;&g;&l;strong&g;Ransomware&l;/strong&g; &a;ndash;&a;nbsp; Blocking critical aspects of your networks.&l;/span&g;&l;/li&g;\n&l;li&g;&l;span style\&q;color: #000000;\&q;&g;&l;strong&g;Installing&l;/strong&g; &l;strong&g;software&l;/strong&g; that uses your networks without your permission.&l;/span&g;&l;/li&g;\n&l;li&g;&l;span style\&q;color: #000000;\&q;&g;&l;strong&g;Spyware&l;/strong&g; &a;ndash;&a;nbsp; Secretly finding information on your computer and sending it back to the attacker.&l;/span&g;&l;/li&g;\n&l;li&g;&l;span style\&q;color: #000000;\&q;&g;&l;strong&g;Trojans &a;ndash;&a;nbsp; &l;/strong&g;Powerful and costly viruses are able to deceive regular antivirus software by pretending to look safe, &l;a style\&q;color: #000000;\&q; title\&q;Trojan horse\&q; href\&q;https://www.britannica.com/topic/Trojan-horse\&q; target\&q;_blank\&q; rel\&q;noopener\&q;&g;hence the name \&q;&l;strong&g;trojan&l;/strong&g;\&q; borrowed from the greek wooden horse used in the Trojan war&l;/a&g;. Once it has gained access to the software, it then drops and reloads viruses and malware. A famous trojan virus known as &a;ldquo;&l;a style\&q;color: #000000;\&q; title\&q;Emotet\&q; href\&q;https://www.malwarebytes.com/emotet\&q; target\&q;_blank\&q; rel\&q;noopener\&q;&g;&l;strong&g;Emotet&l;/strong&g;&l;/a&g;&a;rdquo; initially targeted banks, but now the main target for Emotet malware is big businesses and governments - this doesn&s;t automatically mean that small businesses are safe from these vicious attacks, but perhaps less likely to be attacked.&l;/span&g;&l;/li&g;\n&l;li&g;&l;span style\&q;color: #000000;\&q;&g;&l;strong&g;Break down&l;/strong&g; your systems to make them unusable.&l;/span&g;&l;/li&g;\n&l;/ul&g;\n&l;h4&g;&l;span style\&q;color: #000000;\&q;&g;&l;strong&g;2. &l;/strong&g;&l;strong&g;Denial of Service - DoS&l;/strong&g;&l;/span&g;&l;/h4&g;\n&l;p&g;&l;span style\&q;color: #000000;\&q;&g;&l;a style\&q;color: #000000;\&q; title\&q;DoS\&q; href\&q;https://www.paloaltonetworks.com/cyberpedia/what-is-a-denial-of-service-attack-dos\&q; target\&q;_blank\&q; rel\&q;noopener\&q;&g;&l;strong&g;Denial of Service&l;/strong&g;&l;/a&g; is an attack that overwhelms your computer or your network so that it cannot respond to your requests. Your computer will freeze as it tries to respond to the viruses flooding data, and your software will likely stop working all together.&l;/span&g;&l;/p&g;\n&l;p&g;&l;span style\&q;color: #000000;\&q;&g;These types of attacks are often used to stop for example significant business agreements before they&a;rsquo;re settled. This can cause businesses to miss out on huge opportunities as their rivals win a time. DoS are also used to stall the networks while more malicious attacks are entering into the software. When your computer is trying to process the overwhelming data, the anti-virus software is denied access. This leaves the computer vulnerable, and more dangerous malware can easily enter your cyberspace.&l;/span&g;&l;/p&g;\n&l;h4&g;&l;span style\&q;color: #000000;\&q;&g;&l;strong&g;3. &l;/strong&g;&l;strong&g;Man in the Middle - MITM&l;/strong&g;&l;/span&g;&l;/h4&g;\n&l;p&g;&l;span style\&q;color: #000000;\&q;&g;&l;a style\&q;color: #000000;\&q; title\&q;MiM\&q; href\&q;https://www.imperva.com/learn/application-security/man-in-the-middle-attack-mitm/\&q; target\&q;_blank\&q; rel\&q;noopener\&q;&g;&l;strong&g;Man in the middle&l;/strong&g;,&l;/a&g; or MITM cyber security threats, are the most dangerous to the public and to small businesses. These attacks happen for example through an unsecured public Wi-Fi network; a public user (a customer for example) connects to your business through an unprotected network, the hacker then spots this connection and manipulates the system to allow them to enter in the opened space between. &l;/span&g;&l;/p&g;\n&l;p&g;&l;span style\&q;color: #000000;\&q;&g;Once inside, the hacker has free access to both the customer&a;rsquo;s and your business&a;rsquo; software and can send malware to do further damage. But the hacker may also fool you, pretend to be the business/the customer, and this way they receive private data without sending in any malware at all.&l;/span&g;&l;/p&g;\n&l;h4&g;&l;span style\&q;color: #000000;\&q;&g;&l;strong&g;4. &l;/strong&g;&l;strong&g;Phishing&l;/strong&g;&l;/span&g;&l;/h4&g;\n&l;p&g;&l;span style\&q;color: #000000;\&q;&g;&l;a style\&q;color: #000000;\&q; title\&q;Phishing\&q; href\&q;https://www.phishing.org/what-is-phishing\&q; target\&q;_blank\&q; rel\&q;noopener\&q;&g;&l;strong&g;Phishing&l;/strong&g; &l;/a&g;is when for example an email is designed to look like a familiar company, but is actually a hacker in disguise trying to persuade you into clicking their links.&l;/span&g;&l;/p&g;\n&l;p&g;&l;span style\&q;color: #000000;\&q;&g;These phishing emails with links can be made to look like documents or like a possible investor, a new client, or a business loan late payment email. These will look as those they are coming from a legitimate source, which is why education about phishing emails are so important!&l;/span&g;&l;/p&g;\n&l;h4&g;&l;span style\&q;color: #000000;\&q;&g;&l;strong&g;5. &l;/strong&g;&l;strong&g;Structured Query Language Injection - SQLI&a;nbsp;&l;/strong&g;&l;/span&g;&l;/h4&g;\n&l;p&g;&l;span style\&q;color: #000000;\&q;&g;&l;a style\&q;color: #000000;\&q; title\&q;SQLI\&q; href\&q;https://medium.com/iocscan/sql-injection-sqli-90414fca6664\&q; target\&q;_blank\&q; rel\&q;noopener\&q;&g;&l;strong&g;SQLI stands for Structured Query Language Injection.&l;/strong&g; &l;/a&g;This type of cyber security attack is normally aimed at big businesses, and it&a;rsquo;s a data-stealing attack. To bring you the information you are looking for while searching online Structured Query Language is used in most search boxes. &l;/span&g;&l;/p&g;\n&l;p&g;&l;span style\&q;color: #000000;\&q;&g;The &a;ldquo;injection&a;rdquo; part then adds a powerful &a;ldquo;kick&a;rdquo; into the search, and this &a;ldquo;kick&a;rdquo; injection is so strong that it bounces back into the user and pulls out information about them. You will still get your search result, but the SQLI uses your question as a doorway back into your information. Here your credit card information is at risk for example.&l;/span&g;&l;/p&g;\n&l;h4&g;&l;span style\&q;color: #000000;\&q;&g;&l;strong&g;6. &l;/strong&g;&l;strong&g;Password Attacks&l;/strong&g;&l;/span&g;&l;/h4&g;\n&l;p&g;&l;span style\&q;color: #000000;\&q;&g;This cyber security threat is sadly so common, that most people no longer see it as a threat. But we beg to disagree! Even though most understand the importance of keeping a password secret, not everyone understands how to keep it secret. And there are still a range of generations of people using the internet, all to a different level of understanding.&l;/span&g;&l;/p&g;\n&l;ul&g;\n&l;li&g;&l;span style\&q;color: #000000;\&q;&g;&l;strong&g;Guessing &a;ndash;&l;/strong&g; If your password is &a;ldquo;1234&a;rdquo;, a cyber criminal doesn&a;rsquo;t have to try very hard to access your data.&l;/span&g;&l;/li&g;\n&l;li&g;&l;span style\&q;color: #000000;\&q;&g;&l;strong&g;Hacking a database &a;ndash; &l;/strong&g;If your passwords are stored in one location, or if another company keeps passwords unprotected, then a hacker that manages to break through these locations will have total access. This is why it&a;rsquo;s best to never have the same password for two or more areas. If a hacker manages to acquire one of your passwords, they will attempt to open all of your online locations using it.&l;/span&g;&l;/li&g;\n&l;li&g;&l;span style\&q;color: #000000;\&q;&g;&l;strong&g;Human interaction &a;ndash;&l;/strong&g; We all read theposts on social media saying, &l;em&g;&a;ldquo;Your band name is your childhood pet, mother&a;rsquo;s maiden name, and your hometown.&a;rdquo;&l;/em&g; A funny game, we think, and submit our &a;ldquo;band name&a;rdquo; in the comments. These details are often a part of your security codes, information that will help cybercriminals either to guess your password or tell the website that you forgot your password and reset it.&l;/span&g;&l;/li&g;\n&l;/ul&g;\n&l;h2&g;&l;span style\&q;font-size: 36pt; color: #000000;\&q;&g;Preventive steps&l;/span&g;&l;/h2&g;\n&l;p&g;&l;span style\&q;color: #000000;\&q;&g;To try and stay ahead if cyber criminals, here is a list of preventive actions that You can do to take precautions:&l;/span&g;&l;/p&g;\n&l;ul type\&q;disc\&q;&g;\n&l;li&g;&l;span style\&q;color: #000000;\&q;&g;Try to &l;strong&g;avoid public networks&l;/strong&g; at all times!&l;/span&g;&l;/li&g;\n&l;li&g;&l;span style\&q;color: #000000;\&q;&g;Always keep your &l;strong&g;computer updated&l;/strong&g;.&l;/span&g;&l;/li&g;\n&l;/ul&g;\n&l;ul&g;\n&l;li&g;&l;span style\&q;color: #000000;\&q;&g;When choosing your &l;strong&g;password,&l;/strong&g; work better &a;ndash; not harder. &l;strong&g;&l;a style\&q;color: #000000;\&q; title\&q;4P rule\&q; href\&q;https://news.farsight.se/posts/pressreleases/when-people-do-things-they-shouldnt---and-how\&q; target\&q;_blank\&q; rel\&q;noopener\&q;&g;Think of the 4 P-rule&l;/a&g;:&a;nbsp;&l;/strong&g;&l;/span&g;&l;/li&g;\n&l;/ul&g;\n&l;p&g;&l;span style\&q;color: #000000;\&q;&g;&l;strong&g;- PRIVATE&l;/strong&g; &a;ndash; something that&a;rsquo;s important only to You - not common knowledge!&l;/span&g;&l;/p&g;\n&l;p&g;&l;span style\&q;color: #000000;\&q;&g;&l;strong&g;- PERSONAL&l;/strong&g; &a;ndash; no movie quotes, no song lyrics etc.&l;/span&g;&l;/p&g;\n&l;p&g;&l;span style\&q;color: #000000;\&q;&g;&l;strong&g;- PRACTICAL&l;/strong&g; &a;ndash; easy to remember and write &a;ndash; make it long, but not complicated. A sentence is a great option!&l;/span&g;&l;/p&g;\n&l;p&g;&l;span style\&q;color: #000000;\&q;&g;&l;strong&g;&a;nbsp;- PROVOCING&l;/strong&g; &a;ndash; Something sexy, horny, pornographic (yes, you heard us!) - it should be something you don&a;rsquo;t want to say out loud!&l;/span&g;&l;/p&g;\n&l;blockquote&g;\n&l;p&g;&l;span style\&q;font-size: 14pt; color: #000000;\&q;&g;&l;em&g;&a;nbsp;\&q;Something sexy, horny, pornographic (yes, you heard us!) - it should be something you don&a;rsquo;t want to say out loud!\&q;&l;/em&g;&l;/span&g;&l;/p&g;\n&l;/blockquote&g;\n&l;ul type\&q;disc\&q;&g;\n&l;li&g;&l;span style\&q;color: #000000;\&q;&g;&l;strong&g;To prevent malware&l;/strong&g; &l;strong&g;of any kind, you should think one extra time before you click on a link, attachment, or download&l;/strong&g;. This is how the worms enter your networks, and this should be ingrained into every employee - if you do not trust the source of the link, do NOT click on it!&l;/span&g;&l;/li&g;\n&l;li&g;&l;span style\&q;color: #000000;\&q;&g;&l;a style\&q;color: #000000;\&q; title\&q;Antivirus\&q; href\&q;https://www.verizon.com/info/definitions/antivirus/\&q; target\&q;_blank\&q; rel\&q;noopener\&q;&g;&l;strong&g;Install antivirus software.&l;/strong&g;&l;/a&g; When you choose antivirus software, don&a;rsquo;t simply go with the cheapest option. Use virus protection software of high standards that have been peer-reviewed and proven to shut down heavy-hitting attacks.&l;/span&g;&l;/li&g;\n&l;li&g;&l;span style\&q;color: #000000;\&q;&g;&l;a style\&q;color: #000000;\&q; title\&q;VPN\&q; href\&q;https://us.norton.com/internetsecurity-privacy-what-is-a-vpn.html\&q; target\&q;_blank\&q; rel\&q;noopener\&q;&g;&l;strong&g;Install a Virtual Private Network (VPN) on your computer&l;/strong&g;&l;/a&g;, that will create automatic encryptions for you and your business in cyberspace.&l;/span&g;&l;/li&g;\n&l;li&g;&l;span style\&q;color: #000000;\&q;&g;&l;strong&g;To protect yourself from harmful emails&l;/strong&g;, you should keep a list of legitimate email addresses close to hand. If you get an email from a supposedly legitimate source, but the email address doesn&a;rsquo;t match the one confirmed on your list, you should reach out to the confirmed email address and ask them about the suspicious one.&l;/span&g;&l;/li&g;\n&l;li&g;&l;span style\&q;color: #000000;\&q;&g;&l;strong&g;If you have an online website, make sure it has a &l;a style\&q;color: #000000;\&q; title\&q;POLP\&q; href\&q;https://digitalguardian.com/blog/what-principle-least-privilege-polp-best-practice-information-security-and-compliance\&q; target\&q;_blank\&q; rel\&q;noopener\&q;&g;Principle of Least Privilege&l;/a&g; (PoLP) system.&l;/strong&g; This means making sure each account only has access to its job &a;ndash; no more, no less &a;ndash; and if one section gets hacked, it doesn&a;rsquo;t grant access to anything else.&l;/span&g;&l;/li&g;\n&l;/ul&g;\n&l;p&g;&l;img style\&q;max-width: 100%; height: auto;\&q; src\&q;https://cdn.filestackcontent.com/gxQBup9VQVCHUdFfBZzo\&q; alt\&q;Hand tapping on a keybord to a laptop, an image of a virus sign is crossed over and the text \&q; /&g;&l;/p&g;\n&l;h2&g;&l;span style\&q;color: #000000;\&q;&g;Practice, practice, practice...&l;/span&g;&l;/h2&g;\n&l;p&g;&l;span style\&q;color: #000000;\&q;&g;Last, but not least, you can also conduct penetration tests, to identifying the most likely pathways hackers might use to install malware into your organization. Of cause you should back up your data on a regular basis. Practice makes perfect as we all know, so keep up the good work and stay safe! &l;/span&g;&l;/p&g;\n&l;p&g;&l;span style\&q;color: #000000;\&q;&g;If cybercriminals follow \&q;trends\&q;, then so should you - let&s;s all make an effort to make sacurity and safety trendy!&a;nbsp;&l;/span&g;&l;/p&g;&q;,&q;companyAbout&q;:&q;&l;p style\&q;white-space: pre-wrap; font-size: 17px; margin-bottom: 0; font-style: italic;\&q;&g;ProVide Server combines a user-friendly web interface for user collaboration with powerful SFTP, FTPS and TFTP services. It allows all of your file transfers take place on your own private cloud, completely secure from the outside world.&l;/p&g;&q;,&q;canonicalUrl&q;:null,&q;imageUrl&q;:&q;https://cdn.filestackcontent.com/auto_image/PW1mP8VZQF2wHOf03ATv&q;,&q;imageDescription&q;:&q;&q;,&q;imageAlt&q;:&q;A Guy Fawkes mask in bright neon colors and a diagram.&q;,&q;published&q;:&q;2022-08-08T09:49:00.000Z&q;,&q;created&q;:&q;2022-08-08T09:49:00&q;,&q;sluggedName&q;:&q;trendy-cyber-security-threats-of-2022---so-fa&q;,&q;isFeatured&q;:false,&q;language&q;:&q;en&q;,&q;status&q;:&q;active&q;,&q;type&q;:&q;blog&q;,&q;contacts&q;:,&q;topics&q;:,&q;relatedContent&q;:,&q;publishUrl&q;:&q;news.provideserver.com/posts/blogposts/trendy-cyber-security-threats-of-2022---so-fa&q;}}}/script>/body>/html>
View on OTX
|
View on ThreatMiner
Please enable JavaScript to view the
comments powered by Disqus.
Data with thanks to
AlienVault OTX
,
VirusTotal
,
Malwr
and
others
. [
Sitemap
]