Security
If you are thinking “I’ve heard of the dark web, but I don’t really know what it is,” well, I am here to shed some light on the mysteries of the dark web. The term…
When ransomware is dropped on your desktop and file shares, it feels like the beginning of the nightmare. It’s the final scene. Long befor...
When talking about security or real-life attacks, the focus naturally tends to be on the things that went wrong. Security reports look at th...
The most powerful word in root cause analysis is why. Not just what happened, but why. If you trace it back a few steps, that can give a pretty good idea of all of the…
There are a lot of different types of malicious software (malware). Viruses and worms directly infect systems for a specific purpose. This can be stealing data or credentials, but it could be to perform any…
Early in 2025, a Thrive customer noticed something odd. One seemingly innocuous CPU spike was the first indicator of a problem that could have potentially destroyed an entire multi-state manufacturing company. The Background Before the…