Home Blog Page 212
Microsoft recently announced its bug bounty program “The Azure Sphere Research Challenge,” which offers security researchers up to $100,000 bounty to break into its Azure Sphere Linux IoT OS platform and discover vulnerabilities. Linux IoT OS is a custom made...
Law firms have long been known as a "soft target" for bad actors in the technology space. The amount of sensitive data that exists at a law firm is a treasure chest for hackers or bad actors - privileged...
Researchers discovered a new ransomware codenamed “ColdLock” that targeted several organizations in Taiwan. According to researchers from Trend Micro, the ransomware appears to target databases and email servers for encryption. The researchers found similarities between ColdLock and previously discovered ransomware...
A report from cybersecurity research firm Stott and May revealed that most of the cybersecurity leaders are struggling with skills shortage. The research report “Cybersecurity in Focus 2020” highlighted that 76% of respondents believe there is a shortage of...
Today is World Password Day. A day meant to remind everyone about the importance of protecting themselves through strong passwords. World Password Day is an annual observance that falls on the first Thursday of every May, also meant to...
With more than 200 million active Office 365 users in FY20Q1 (now nearing 258 million) and the corresponding urge to up the security features, Microsoft has now introduced a ‘stop auto-forwarding emails’ configuration. It helps enterprises disable Office 365’s...
India-based online learning platform Unacademy suffered a data breach that exposed details of 22 million users, cybersecurity firm Cyble revealed. It was also found that the unknown hackers kept 21,909,707 user records for sale at $2,000 on darknet forums....
Three-quarters of millennials in America use the same password for more than ten different devices, apps, and other social media accounts, according to a study by Clario and OnePoll. The survey revealed certain alarming statistics about the password practices followed by Americans. Most of...
The industrious and criminal-minded threat actors behind the majority of cyberattacks have reinvented their attack approaches during the ongoing COVID-19 pandemic. Since the advent of the outbreak, cybercriminals are developing new phishing tools, hacking strategies, and exploring different attack...
Is cloud the ultimate data storage solution? That remains a hot and widely debated topic. Every day more and more organizations are unplugging their data centers and are moving to the cloud. As for most organizations, cloud migration is...