
The Admin By Request
Security Blog
Cyber attacks, emerging threats, current events, latest news, recent updates, and more.
Kettering Health Data Leaked After Interlock Ransomware Attack
A ransomware attack on Kettering Health disrupted patient care and led to leaked data after the organization refused to pay the Interlock ransom demand.
Identity-Based Attacks: Why Login Theft Is Just the Start
A compromised login is just the start. See how attackers escalate access and how just-in-time privilege management breaks the attack chain.
Government Data Wiped by Insider Hackers in OPEXUS Security Breach
Two convicted hackers deleted 33 federal databases in a shocking insider breach at OPEXUS, exposing major flaws in access control and vetting.
PAM vs VPAM: Why Vendor Access Deserves Special Attention
When vendors get hacked, you get hacked. Explore why managing vendor access is now a critical component of your cybersecurity strategy.
Zero-Day Exploits: When Security Patches Can’t Save You
Zero-day exploits hit before defenders even know what to look for. See why managing user privileges is your best chance to limit real-world damage.
How Robotic Process Automation (RPA) Creates Security Risks
Get ahead of the threats. Learn how to secure robotic process automation (RPA) and prevent breaches from poorly managed bots.
Dior Joins Growing List of Retailers Targeted by Cybercriminals
Dior joins a wave of retail brands hit by cyberattacks. While financial data was safe, exposed shopping histories raise major phishing risks.
Building a Cybersecurity Culture That Protects Your Business
Strong cybersecurity starts with people. See how building the right culture can prevent breaches and support real business productivity.
Implement Zero Standing Privileges Without Breaking Everything
Implementing zero standing privileges doesn’t have to break workflows. Discover how to strengthen security, avoid helpdesk chaos, and keep users productive.
What is an Advanced Persistent Threat (APT)?
Learn how an advanced persistent threat (APT) works, why it's so dangerous to organizations, and what steps can help detect and respond before damage is done.
AI in Cybersecurity Arms Both Sides of the Fight
AI in cybersecurity is playing both sides, arming attackers and defenders with tools that get smarter every day. See how it's changing things across the board.
Access Control Made Easy: RBAC vs ABAC vs PBAC
Discover the key differences between RBAC vs ABAC vs PBAC in access control. Find out which model best fits your organization’s security and compliance needs.
Don’t Get Hooked: 10 Social Engineering Indicators
Spot these social engineering indicators before you get tricked. Discover 10 red flags attackers use to manipulate your actions and access sensitive data.
Lessons from the PAN-OS Authentication Bypass Vulnerability
PAN-OS vulnerability CVE-2025-0108 showed how fast hackers strike. Learn key lessons in patching, privilege control, and layered cybersecurity defenses.
Zero Trust Architecture: 7 Security Benefits that Justify the Investment
Find out how Zero Trust Architecture reduces risk, simplifies compliance, and protects your cloud environment with these 7 practical, proven benefits.
Enhancing RDP Security: Best Practices for Remote Access
Strengthen RDP security with practical, real-world measures. Learn about the threats, best practices, and a more convenient way to keep remote work safe.
Revisiting the Finastra Data Breach: What Went Wrong?
Back in February, Finastra announced a data breach that exposed customer info. Learn how it happened and what you can do to better protect your own data.
How to Implement the Principle of Least Privilege in Your Organization
Minimize risk and boost productivity through the Principle of Least Privilege. Learn how to protect your organization without slowing users down.
Just-In-Time Access: The Key to Balancing Security and Productivity
Boost security and productivity with Just-In-Time access - granting users privileges only when needed. Reduce risk, streamline IT, and stay in control.
The Impact of Endpoint Privilege Management on IT Operations
Enhance security and streamline IT with Endpoint Privilege Management (EPM). Reduce risks, ensure compliance, and optimize operations with least-privilege access.
What is Privileged Access Management (PAM)?
Privileged Access Management controls & secures high-level accounts to prevent breaches, limit cyber threats, and ensure compliance. Here’s why it matters.
Ransomware Attack Hits Indian Tech Giant Tata Technologies
A recent Ransomware attack forced the Indian Multinational Technology giant to suspend several IT services. Here's the breakdown.
PAM for Dummies: What is Privileged Access Management?
Learn how Privileged Access Management (PAM) secures sensitive data, reduces security risks, and ensures compliance by controlling privileged user access.
Top Free Remote Desktop Software for Seamless Access
Find free remote desktop software for seamless access. Boost productivity with Admin By Request's secure, versatile solutions including a lifetime Free Plan.
Mastering Privilege Escalation: Techniques & Prevention Strategies
Master privilege escalation with techniques and prevention tips to safeguard your systems from threats. Learn effective strategies with Admin By Request EPM.
Effective Solutions for Remote VA Access (Virtual Assistant)
Discover secure and efficient solutions for remote VA access. Explore tools like AVD, Citrix, and Admin By Request to enhance productivity.
Understanding Access and Identity Management: Guide to Secure Systems
Master access and identity management with this guide. Learn how AIM enhances security, boosts efficiency, and ensures compliance for your organization.