Ipswitch, Inc

Look in any organization today and you will find a hard-working group of individuals tasked with the near impossible: navigating an increasingly complex IT environment while securely delivering virtually zero downtime. This is the IT Team. And Ipswitch helps them shine.

C-Suite On Deck

Responsive image

Feature market insights and perspectives from top C-Level executives, elite technology influencers and thought leaders from your company here. This signature initiative has garnered immense support...

Contact Us

Events

Related News

THSUITE, POS SYSTEM IN CANNABIS INDUSTRY, LEAKS 85,000 FILES

Security Magazine | January 22, 2020

news image

Led by internet privacy researchers Noam Rotem and Ran Locar, vpnMentor’s research team discovered a data breach in THSuite, a point-of-sale system in the cannabis industry. The research team identified an unsecured Amazon S3 bucket owned by THSuite that exposed 85,000 files of sensitive data from multiple marijuana dispensaries around the U.S. and their customers. The leaked data included scanned government and employee IDs, exposing personally identifiable information (PII) for over 30,0...

Read More

HACKER LEAKS MORE THAN 500,000 TELNET CREDENTIALS

CISOMAG | January 20, 2020

news image

As reported by ZDNet, a hacker who seems to be a DDoS-for-hire (DDoS booter) service operator, has published a massive list of 515,000 Telnet credentials consisting passwords of servers, home routers, and IoT (Internet of Things) devices. The published list also includes IP address of each device along with a username and password of its Telnet service. Telnet is a remote access protocol that can be used to control devices over the internet. The hacker compiled the leaked list by scanning the in...

Read More

DATA SECURITY

75% OF IT LEADERS ARE UNCONVINCED ABOUT THE SECURITY OF THEIR WEB APPLICATIONS

Cymatic | April 12, 2021

news image

Today, Cymatic released new research on the state of web application security. While IT leaders tend to be somewhat confident in their existing solutions, relying on various products renders smooth adoption of emerging tools—and therefore overall cyber threat prevention—a major task. Pulse conducted a study of C-suite and VP-level executives in information technology and cybersecurity and discovered that the most common approaches to web application safety fail to enge...

Read More

GARMIN FACING U.S. INVESTIGATION OVER PAYMENTS TO TERRORISTS BY THIRD PARTY FOLLOWING CYBER ATTACK

channelnews | August 05, 2020

news image

Garmin is believed to be under investigation by US authorities, for paying cyber terrorists millions of dollars via a third party after their data operations were taken down in a major hack attack by an organisation called Evil Corp.The US Company who like to present themselves as a squeaky-clean Company appears to have had no hesitation in paying Evil Corp who has been sanctioned by the US Treasury as a terrorist organisation....

Read More
news image

THSUITE, POS SYSTEM IN CANNABIS INDUSTRY, LEAKS 85,000 FILES

Security Magazine | January 22, 2020

Led by internet privacy researchers Noam Rotem and Ran Locar, vpnMentor’s research team discovered a data breach in THSuite, a point-of-sale system in the cannabis industry. The research team identified an unsecured Amazon S3 bucket owned by THSuite that exposed 85,000 files of sensitive data from multiple marijuana dispensaries around the U.S. and their customers. The leaked data included scanned government and employee IDs, exposing personally identifiable information (PII) for over 30,0...

Read More
news image

HACKER LEAKS MORE THAN 500,000 TELNET CREDENTIALS

CISOMAG | January 20, 2020

As reported by ZDNet, a hacker who seems to be a DDoS-for-hire (DDoS booter) service operator, has published a massive list of 515,000 Telnet credentials consisting passwords of servers, home routers, and IoT (Internet of Things) devices. The published list also includes IP address of each device along with a username and password of its Telnet service. Telnet is a remote access protocol that can be used to control devices over the internet. The hacker compiled the leaked list by scanning the in...

Read More
news image

DATA SECURITY

75% OF IT LEADERS ARE UNCONVINCED ABOUT THE SECURITY OF THEIR WEB APPLICATIONS

Cymatic | April 12, 2021

Today, Cymatic released new research on the state of web application security. While IT leaders tend to be somewhat confident in their existing solutions, relying on various products renders smooth adoption of emerging tools—and therefore overall cyber threat prevention—a major task. Pulse conducted a study of C-suite and VP-level executives in information technology and cybersecurity and discovered that the most common approaches to web application safety fail to enge...

Read More
news image

GARMIN FACING U.S. INVESTIGATION OVER PAYMENTS TO TERRORISTS BY THIRD PARTY FOLLOWING CYBER ATTACK

channelnews | August 05, 2020

Garmin is believed to be under investigation by US authorities, for paying cyber terrorists millions of dollars via a third party after their data operations were taken down in a major hack attack by an organisation called Evil Corp.The US Company who like to present themselves as a squeaky-clean Company appears to have had no hesitation in paying Evil Corp who has been sanctioned by the US Treasury as a terrorist organisation....

Read More