Home Search

Microsoft Exchange - search results

If you're not happy with the results, please do another search

Microsoft Along with Global Internet and Law Enforcement Agencies Come Together to Disrupt Necurs

0
Microsoft and its partners across several countries went all guns blazing against the nefarious botnets called Necurs. The infamous Necurs is touted to be...
data breaches, Verizon Data Breach Investigation Report

40 Billion User Records Exposed Globally in 2021

0
Cybercriminals often exploit leaked/stolen sensitive user information to perform various cyberattacks, including phishing and identity theft. The rising information leaks on dark web forums...
Russian hackers, Senate Homeland Security Report, Electronic Warfare Associates

Federal Agencies Release Advisory On Mitigating Security Threats From Russian APT Actors

0
State-sponsored hackers from Russia continue to prevail in the cyberthreat landscape. Government authorities and organizations globally are warning about frequent cyberespionage campaigns from Russian...
Cryptojacking

Cryptojacking Attacks Rise As Hackers Try to Exploit Linux-based Machines

0
Researchers at Bitdefender Security recently discovered a Romanian-based threat intelligence group hacking Linux machines and targeting systems with weak Secure Shell Protocol (SSH) credentials. The...
DeadBolt, Shutterfly ransomware, Cuba ransomware

Cuba Ransomware Infringed 49 Critical Infrastructure Entities

0
In a flash alert, the Federal Bureau of Investigation (FBI), in coordination with DHS/CISA, identified that since early November 2021, Cuba ransomware had infiltrated...
ChamelGang

Russia’s Critical Sectors Under APT Group ChamelGang’s Radar

0
The attack vector of Russian state-sponsored advanced persistent threat (APT) attackers is extended across various countries. Multiple cybercriminal groups from Russia have targeted several...
Malware and Vulnerability Trends Report, Mobile malware threats

Malware and Vulnerability Trends Report: High-risk Vulnerabilities in Corporate Software Frequently Targeted

0
Since devices are connected to the internet more than ever before, exploiting vulnerabilities to cross privilege boundaries has become common. Recently, Recorded Future and...
Remote Security Policy, Remote Work Jeopardizes Corporate Network Security: Report

Overcoming the Challenges of Executing a Remote Security Policy

0
Gartner estimates that around 30% of workers in India will be remote in 2022. While the penetration might be low compared to the U.S.,...
JVCKenwood, LockFile ransomware, ransomware attacks in India, Suppress ransomware payment channels

New Ransomware LockFile Targets Victims with Intermittent Encryption Technique

0
A new ransomware variant has been making the rounds in the cyberthreat landscape. Security experts from Sophos uncovered new ransomware dubbed LockFile targeting victims...
Black Kingdom ransomware

Cybercriminals Entice Employees to Deploy Black Kingdom Ransomware

0
In a new kind of insider threat campaign, cybersecurity researchers found a Nigerian cybercriminal group enticing unwitting employees by offering them a share of...

MOST POPULAR

RECENT POSTS