
The Admin By Request
Security Blog
Cyber attacks, emerging threats, current events, latest news, recent updates, and more.
SafePay Ransomware Cripples Global IT Distributor Ingram Micro
A July 4th ransomware attack by SafePay crippled Ingram Micro systems. Explore the breach, its impact, and the rising threat of supply chain attacks.
Why User Experience vs. Security is a False Dilemma
When security feels like punishment, users push back. Learn how invisible security and smart UX make compliance effortless and effective.
Why is IT Drowning in Tickets? The Cost of Permanent Admin Rights
Removing admin rights doesn’t mean losing productivity. See how just-in-time elevation keeps users moving while IT regains control and cuts tickets.
Scattered Spider Suspected in Qantas Breach as Aviation Attacks Mount
A Qantas data breach exposed 6 million passengers. Experts suspect Scattered Spider, a group targeting airlines with advanced social engineering.
The PDF Trap: How Callback Phishing Attacks Work
PDF phishing is on the rise. Learn how attackers use trusted documents and fake phone numbers to bypass defenses in callback phishing campaigns.
Spotting Privilege Creep: How Hidden Access Rights Threaten Security
From forgotten admin rights to cross-department access, privilege creep is real. Learn how to spot red flags and prevent unnecessary exposure now.
Admin By Request Launches New Datacenter POP in Singapore
Singapore is a strategic market and the opening of this datacenter underscores our commitment to providing secure, localized solutions for our customers.
Why Some PAM Deployments Fail (And How to Pick One That Succeeds)
PAM deployments often fail due to complexity and poor user experience. Learn how to avoid pitfalls and select a solution that fits your organization.
McLaren Health Care Ransomware Attack Exposed Over 743,000 Patient Records
McLaren Health Care's July 2024 ransomware attack exposed data of 743,131 patients, raising concerns about repeated cybersecurity failures.
Security Theater: Are You Paying for the Illusion of Protection?
False confidence is the true cost of security theater. Learn how to break free from the illusion and invest in protection that actually works.
Top 8 BYOD Security Risks (And What to Do About Them)
BYOD is convenient, but risky. Discover 8 major security threats and how to protect sensitive data on employee-owned devices without hurting productivity.
EchoLeak: First Known Zero-Click AI Attack Targets Microsoft Copilot
One email. No clicks. Full data breach. EchoLeak shows how AI assistants like Microsoft Copilot can become dangerous tools in the wrong hands.
What is Shadow IT? A Guide to Invisible IT Infrastructure
Your IT team isn't in control of everything. Learn how Shadow IT grows, the risks it creates, and what to do to protect your business.
Whole Foods Supplier UNFI Cyberattack Leaves Grocery Shelves Bare
UNFI, Whole Foods' main distributor, suffered a cyberattack forcing a shutdown. Stores nationwide report outages and supply chain chaos.
Admin By Request: Danish Cybersecurity with Global Reach
A top Danish cybersecurity firm, Admin By Request, offers secure privilege management & remote access, gaining global traction as a trusted EU-based alternative
What is Endpoint Security? And Why Does It Matter?
Discover why endpoint security is vital in a remote work world where laptops, phones, and IoT devices are the new frontline against cyber threats.
Browser-in-the-Middle Attacks: When Your Browser Works for the Wrong Team
Browser-in-the-Middle attacks use real websites through attacker browsers, bypassing MFA and fooling users with near-perfect phishing deception.
Why DORA’s Audit Requirements Favor Just-in-Time Privilege Management
Struggling with DORA access control rules? Just-in-time access enforces least privilege and creates audit-ready trails that regulators require.
Kettering Health Data Leaked After Interlock Ransomware Attack
A ransomware attack on Kettering Health disrupted patient care and led to leaked data after the organization refused to pay the Interlock ransom demand.
Identity-Based Attacks: Why Login Theft Is Just the Start
A compromised login is just the start. See how attackers escalate access and how just-in-time privilege management breaks the attack chain.
Government Data Wiped by Insider Hackers in OPEXUS Security Breach
Two convicted hackers deleted 33 federal databases in a shocking insider breach at OPEXUS, exposing major flaws in access control and vetting.
PAM vs VPAM: Why Vendor Access Deserves Special Attention
When vendors get hacked, you get hacked. Explore why managing vendor access is now a critical component of your cybersecurity strategy.
Zero-Day Exploits: When Security Patches Can’t Save You
Zero-day exploits hit before defenders even know what to look for. See why managing user privileges is your best chance to limit real-world damage.
How Robotic Process Automation (RPA) Creates Security Risks
Get ahead of the threats. Learn how to secure robotic process automation (RPA) and prevent breaches from poorly managed bots.
Dior Joins Growing List of Retailers Targeted by Cybercriminals
Dior joins a wave of retail brands hit by cyberattacks. While financial data was safe, exposed shopping histories raise major phishing risks.
Building a Cybersecurity Culture That Protects Your Business
Strong cybersecurity starts with people. See how building the right culture can prevent breaches and support real business productivity.
Implement Zero Standing Privileges Without Breaking Everything
Implementing zero standing privileges doesn’t have to break workflows. Discover how to strengthen security, avoid helpdesk chaos, and keep users productive.