Latest news with #ActiveDirectory


Arabian Post
13-06-2025
- Business
- Arabian Post
Danish Precedent Fuels German State's Open‑Source Shift
Northern German state Schleswig‑Holstein has initiated a sweeping migration from Microsoft's proprietary ecosystem—including Windows, Office 365, SharePoint, Exchange, and Active Directory—to open-source platforms like Linux, LibreOffice, Nextcloud, Open‑Xchange, and Thunderbird. The policy will affect some 30,000 public-sector desktops and aims to bolster digital security, cut licensing costs and strengthen data sovereignty amid escalating concerns over foreign influence. Dirk Schrödter, Minister for Digitalisation, underscored the move as critical to ensuring citizen data remains under local control and to stand as 'digitally sovereign IT workplaces'—a benchmark as essential as energy sovereignty. He stated that reliance on closed-source systems leaves no guarantee over data transit or access, especially regarding servers outside the EU. The government's plan, originally launched as a pilot, has expanded into a full-scale transition. By 2026, all Microsoft Office applications will be replaced with LibreOffice, and Windows desktops will be phased out in favour of Linux distributions yet to be finalised. The replacement will also encompass communication and directory infrastructure, with Nextcloud, Open‑Xchange, Thunderbird and a custom Active Directory alternative stepping in for their Microsoft counterparts. ADVERTISEMENT Budgetary savings form a vital component of the rationale. The state projects substantial reductions in licensing outlays, redirecting funds to local digital firms and potentially reinforcing regional employment. The transition strategy emphasises incremental implementation, staff training and department readiness—lessons learnt from Munich's earlier LiMux experiment, which ultimately reverted back to Windows after facing cost and user-adoption challenges. Although LibreOffice is well regarded—with more than a million downloads weekly and earning praise for cost-effectiveness—critics highlight its limitations in collaboration features, user experience and familiarity compared with Microsoft's ecosystem. Open-source advocates argue that modern alternatives such as Collabora Online and Nextcloud-integrated suites bridge the gap in real-time co-editing and collaborative workflows. Private sector and civic supporters welcome Schleswig‑Holstein's move as a testbed for broader European open-source adoption. They suggest that public entities across the EU—especially in education and local administration—could benefit from cost efficiencies and reduced vendor lock-in. Yet sceptics point to the necessity of robust change management, user-centred design and clear fallback strategies to avoid repeating pitfalls faced in Munich. Several high-profile parallels exist elsewhere. South Korea aims for full Linux migration by 2026, while Barcelona pledged a city-wide shift to open-source tools in 2018. Dion Beltrami, a government IT expert, says that despite earlier setbacks, open-source strategies are gaining traction again—driven by rising concerns over licensing expenses, digital autonomy and software customisability. Analysts note that Schleswig‑Holstein's decision aligns with broader EU policy shifts. Regulators have recently scrutinised Microsoft 365 under data protection rules, adding impetus to domestic alternatives. Meanwhile, LibreOffice continues steady development, backed by the Document Foundation and commercial partners like Collabora, ensuring enterprise-grade support and regular updates. Internally, the transition roadmap includes ongoing pilot programmes, comprehensive training for administrators and users, and fallback mechanisms should specialised applications prove incompatible. The government acknowledges that certain niche tasks may still require proprietary apps.
Yahoo
11-06-2025
- Business
- Yahoo
Other World Computing (OWC) Announces Powerful New Updates to Jellyfish, Network-Attached Storage (NAS) Solutions
Jellyfish Turns Impossible Deadlines Into Achievable Wins, and Makes Teams Wonder How They Ever Worked Without It WOODSTOCK, Ill., June 11, 2025--(BUSINESS WIRE)--Other World Computing (OWC®), a trusted leader in high-performance storage, memory, connectivity, software, and accessories that empower creative and business professionals to maximize performance, enhance reliability, and streamline workflows, today announced the latest software release for its acclaimed OWC Jellyfish network-attached storage (NAS) solution. The new updates, designed specifically for video production teams, introduce a redesigned Jellyfish Manager and an all-new Jellyfish Media Manager, delivering smarter media workflows, deeper integrations, and unprecedented visibility into team activity and storage performance. Jellyfish, built by creators for creators, remains the most intuitive and powerful NAS solution on the market for video teams. From 4K and 8K video editing to remote collaboration and archival, Jellyfish powers the world's top creative workflows, without IT headaches or lagging performance. Now shipping with all new Jellyfish systems and available to current users, the latest update includes: Enhanced Jellyfish Manager Redesigned UI for an intuitive user experience Active Directory (AD) integration for seamless team access control Automated cloud backups to Backblaze, AWS S3, Google Cloud, and Azure Native Archiware P5 integration for enterprise-class backup and archiving Native Resilio Connect integration for accelerated remote file transfers Live Activity Monitor for real-time insight into users and network performance SMB Multichannel support for faster data throughput on compatible devices Warranty and Service Contract Tracking to stay ahead of renewals Dynamic Disk Profiles with self-managed storage configuration Upgraded security to safeguard media assets Notifications module with Slack and email support for proactive alerts New Jellyfish Media Manager View, organize, manage, and download your media from anywhere in the world Quickly search your media library for the right content Add custom metadata to improve organization and asset tracking "Creative teams today are facing tougher demands than ever: faster turnarounds, massive files, remote collaboration, and the need to keep everything secure and accessible. The last thing they need is a storage system that slows them down," said Larry O'Connor, Founder and CEO of Other World Computing (OWC). "Jellyfish has always been known for making the impossible possible. That is, helping teams meet deadlines that once felt out of reach. This latest update takes that power to the next level. We hear it all the time: 'Why didn't we know about Jellyfish sooner?' Now more than ever, we're making sure the people who need it most can finally discover it, tap into its full potential, and stop wasting time and money on solutions that just can't keep up." To learn more, please visit: About Other World Computing (OWC) Founded in 1988, Other World Computing (OWC®) is a trusted leader in high-performance storage, docks, and memory card solutions that empower professionals in video and audio production, photography, and business with the tools to seamlessly maximize the performance and reliability of their workflows. OWC's professional-grade storage, expansion, media cards, docks, and connectivity, as well as its apps and accessories, are built to last by the people who use them: creatives, businesses, and consumers. For further information, please visit OWC can also be found on LinkedIn and X. ©2025 Other World Computing (OWC). All other brand and product names contained in this announcement may be trademarks or registered trademarks of their respective holders. View source version on Contacts PR Contact: Nicole GormanGorman Communications, for Other World Computing (OWC)M: Sign in to access your portfolio


The Star
11-06-2025
- Business
- The Star
MyCert: Malaysia data breaches up 29% in Q1 2025
MyCert said reports on ransomware incidents have decreased to 25% in Q1 2025, with 12 incidents compared to 16 in the last quarter. — Pixabay PETALING JAYA: The Malaysia Computer Emergency Response Team (MyCert) reported an increase in data breach incidents in Malaysia in the first quarter of the year. "Data breach incidents are growing in Malaysia with a nearly 29% increase this quarter, underscoring the need for better security measures to ensure national security and public trust," said MyCert. According to its latest Cyber Incident Quarterly Summary report released on June 10, MyCert received 195 incidents reports on data breach incidents in Q1 2025, compared to 151 in Q4 2024. No specific details were provided. It shared that "high-profile breaches" often involve massive datasets with personal identifier information (PII) such as full name, IC number, financial details and addresses being compromised. MyCert, which operates under Cybersecurity Malaysia, said it is also observing a trend of perpetrators stealing and holding sensitive data hostage until the affected organisation pays a ransom. However, it said reports on ransomware incidents have decreased to 25% in Q1 2025, with 12 incidents compared to 16 in the last quarter. It also shared that businesses are the "most impacted by ransomware incidents" in Malaysia with Active Directory servers being primary targets. Fraud incidents continue to target both end users and organisations. MyCert said it has become the preferred method of criminals due to lack of awareness among the public. It reported handling a total of 1,126 fraud cases this quarter, a 2% increase from last quarter. The top fraud incident is phishing with 719 cases, representing 68% of all cases. Overall, MyCert recorded 1,657 incidents in Q1 2025 in a number of categories including denial of service, malicious code and intrusion attempts; marking a 7% increase from 1,550 cases in the previous quarter.
Yahoo
10-06-2025
- Business
- Yahoo
CareHawk Sets New Industry Standard in School Communication Technology with Cybersecure CH2000IP and Spotlight 6.0
LONGWOOD, Fla., June 10, 2025 /PRNewswire/ -- CareHawk®, an established leader in life safety and mass notification systems, is proud to announce the release of Spotlight™ 6.0, the latest evolution of its software platform. This major update adds a host of safety communication capabilities and bolsters cybersecurity to maintain a clear leadership position in this space. "As we continue to lead through innovation, we're also focused on keeping our solutions accessible," said Salvatore Marinello, Vice President of Sales at CareHawk. "We're pleased to confirm that there will be no pricing increases or surcharges through, at minimum, September 1, 2025. Thanks to our integrated manufacturing approach, we can strategically manage rising component and tariff costs, allowing us to deliver industry-leading safety and communication technology at a competitive price." Spotlight 6.0 demonstrates CareHawk's commitment to aligning both physical safety and cybersecurity priorities of today's K–12 schools. As digital threats to school data, records, and infrastructure increase, CareHawk is setting a new standard by integrating rigorous cybersecurity protections directly into its core technology. Spotlight 6.0 delivers enhanced data protection, secure access controls, and independent verification to ensure schools can rely on a resilient, uncompromised safety platform. "We are deeply committed to ensuring both the physical and digital wellbeing of K-12 schools and their staff and students," said Rami Michael, President and CEO of CareHawk. "With Spotlight 6.0 and our independently verified CH2000IP platform, we are fulfilling our vision of being a leader in providing secure and intelligent emergency response solutions that today's schools can depend on." As threats to school security evolve, so should the systems that protect them. Spotlight 6.0 integrates industry-leading cybersecurity enhancements, including Active Directory support, encrypted communications, role-based access control, and independent third-party penetration testing, to ensure that school communication platforms are responsive and secure. The CH2000IP Life Safety Communication Server has undergone independent penetration testing by certified cybersecurity professionals, earning a "None" risk rating, the highest level of confidence possible. Using best-in-class tools and OWASP standards, CareHawk has worked with third-party experts to identify, prioritize, and proactively remediate potential vulnerabilities. "Cybersecurity isn't a checkbox—it's a foundation," said Stacie Dinse, Director of Product Management at CareHawk. "With Spotlight 6.0, we've redefined what schools should expect from a mass notification system. We're empowering districts to not only respond faster, but to do so with absolute confidence in their system's security." In addition to these cybersecurity advancements, Spotlight 6.0 introduces key feature improvements to enhance emergency communication, response, and school-wide situational awareness: Alert Origin Display: See exactly where an alert was initiated across all visual displays and system interfaces for faster, informed responses. Active Directory Integration: Beyond security, it streamlines access control, user and password management and administrative efficiency. Raptor® Integration: Direct connection to the Raptor® Alert App for real-time crisis coordination. Attendees of the 2025 National School Safety Conference & Exposition, taking place July 28 – August 1, 2025, at Virgin Hotels Las Vegas, will have an exclusive opportunity to see Spotlight 6.0 and the CH2000IP platform in action. CareHawk experts will be on-site to provide hands-on demonstrations and insights into the future of secure school communications. Learn more and register for the conference here: Media ContactCareHawk MarketingEmail: marketing@ 1-888-223-5816Website: View original content to download multimedia: SOURCE CareHawk Error in retrieving data Sign in to access your portfolio Error in retrieving data Error in retrieving data Error in retrieving data Error in retrieving data


Techday NZ
10-06-2025
- Business
- Techday NZ
Semperis adds detection for BadSuccessor flaw in Windows 2025
Cybersecurity firm Semperis has introduced new detection capabilities in its Directory Services Protector (DSP) platform, aiming to protect organisations against "BadSuccessor" — a newly disclosed privilege escalation technique in Windows Server 2025 that currently has no available patch. The BadSuccessor flaw, revealed by researchers at Akamai, targets delegated Managed Service Accounts (dMSAs), a new Windows Server 2025 feature designed to enhance the security of service accounts. Instead, the researchers demonstrated how the feature can be exploited to impersonate highly privileged users in Active Directory, such as Domain Admins, without needing additional credentials or triggering alerts. In direct response to Akamai's findings, Semperis worked with the researchers to develop and deploy new detection indicators within its DSP platform. The enhancements include one new Indicator of Exposure (IOE) and three Indicators of Compromise (IOCs), designed to help organisations identify early signs of potential abuse. "Semperis moved quickly to translate the vulnerability into real-world detection capabilities for defenders, demonstrating how collaboration between researchers and vendors can lead to rapid, meaningful impact," said Yuval Gordon, Security Researcher at Akamai. The detection indicators are focused on revealing abnormal behaviour around dMSAs, including excessive delegation rights, suspicious links between dMSAs and privileged accounts, and attempts to target sensitive credentials like the KRBTGT account. According to Semperis, this can give security teams a vital head start in identifying attacks before they can escalate. "Service accounts remain one of the least governed yet most powerful assets in enterprise environments," said Tomer Nahum, Security Researcher at Semperis. "This collaboration with Akamai allowed us to close detection gaps fast and give defenders visibility into a deeply complex area of Active Directory that attackers continue to exploit." The vulnerability has broad implications. Any organisation operating at least one domain controller (DC) running Windows Server 2025 may be at risk. According to Semperis, even a single misconfigured DC using dMSAs could expose the entire Active Directory environment to compromise. As there is currently no fix for the vulnerability, Semperis is urging organisations to take immediate steps to protect their environments. These include auditing dMSA configurations, reviewing delegation permissions, and employing detection tools such as the updated DSP platform. The new detection features aim to support defenders in closing a critical visibility gap. Service accounts, such as dMSAs, often run with elevated privileges but remain unmonitored or poorly managed in many enterprise environments. This lack of oversight creates a potential blind spot for attackers to exploit — a challenge the BadSuccessor technique highlights sharply. Semperis stated that the DSP update is available now and is intended to offer a stopgap solution for organisations as they await official mitigation from Microsoft. The case also serves as a reminder of the growing complexity of managing hybrid identity environments. With attackers increasingly targeting infrastructure such as Active Directory, new features — however well-intentioned — can quickly become unexpected attack vectors. Gordon added, "The abuse of service accounts is a growing concern, and this high-profile vulnerability is a wake-up call." Until a patch is released, security teams are advised to remain vigilant and proactive. By monitoring dMSA activity and understanding their configuration risks, organisations can reduce their exposure to what could otherwise be a silent but highly impactful method of privilege escalation.