Home Search
Microsoft - search results
If you're not happy with the results, please do another search
Cloud is Booming and It Is Going to Get Better in 2025 and Beyond
COVID-19 era has brought a major revolution in the IT domain where cloud services are expected to be the backbone of almost all organizations...
How to Prevent Credential Abuse Attacks?
Strong login credentials are treated as the first defense against unauthorized intrusions. However, they also become a gateway for cybercriminals to penetrate critical network...
How to Stay Digitally Safe This Black Friday and Cyber Monday
The onset of the festive season drives the retail market into a frenzy. After two years of being home-ridden and extra cautious due to...
Cloud Computing Is the Future and Here Are the Latest Trends
In today’s world of hyper-connectivity enterprises are investing in hybrid Cloud solutions, PaaS systems, augmented reality, and open-partner ecosystems. If the past has taught...
‘SharkBot’ Android Trojan Found Targeting Banking Apps and Crypto Exchanges
A new botnet, dubbed “SharkBot,” is targeting Italy, the U.K., and the U.S., including banking applications and cryptocurrency exchanges.
The Cleafy TIR team discovered the...
Beyond Supply Chain Attacks and Ransomware
This past year has been one of victory - for cybercriminals. The first nine months of 2021 saw 40% more cyberattacks than the same...
Emotet Botnet Resurfaces via TrickBot
Emotet, a banking-trojan-turned-botnet that primarily spread via emails, has raised its head after a hiatus of 10 months. Emotet made headlines when Europol announced...
Trickbot Remains the Most Prevalent Malware
The evolution of new malware variants has become prevalent in the cyberthreat landscape. Cybercriminals continue to create novel malicious codes, botnets, or redesign old...
HTML Smuggling – A Novel Malware Deploying Technique
Like creating various malware variants, cybercriminals often find new techniques to deploy malware and evade security scans. As per a report from Microsoft 365...
Sideloading: A New Malware Delivery Method via Spam Email
Cybercriminals often rely on different malware campaigns to exploit new vulnerabilities and break into critical network systems. The latest security research from the Mimecast...