Home Search

Microsoft - search results

If you're not happy with the results, please do another search
Cloud Security

Cloud is Booming and It Is Going to Get Better in 2025 and Beyond

0
COVID-19 era has brought a major revolution in the IT domain where cloud services are expected to be the backbone of almost all organizations...
Credential Abuse Attack, credential harvesting campaign

How to Prevent Credential Abuse Attacks?

0
Strong login credentials are treated as the first defense against unauthorized intrusions. However, they also become a gateway for cybercriminals to penetrate critical network...
Black Friday

How to Stay Digitally Safe This Black Friday and Cyber Monday

0
The onset of the festive season drives the retail market into a frenzy. After two years of being home-ridden and extra cautious due to...
Cloud Forensics

Cloud Computing Is the Future and Here Are the Latest Trends

0
In today’s world of hyper-connectivity enterprises are investing in hybrid Cloud solutions, PaaS systems, augmented reality, and open-partner ecosystems. If the past has taught...
SharkBot

‘SharkBot’ Android Trojan Found Targeting Banking Apps and Crypto Exchanges

0
A new botnet, dubbed “SharkBot,” is targeting Italy, the U.K., and the U.S., including banking applications and cryptocurrency exchanges. The Cleafy TIR team discovered the...
Ransomware, supply chain and ransomware

Beyond Supply Chain Attacks and Ransomware

0
This past year has been one of victory - for cybercriminals. The first nine months of 2021 saw 40% more cyberattacks than the same...
Glupteba botnet, Emotet botnet

Emotet Botnet Resurfaces via TrickBot

0
Emotet, a banking-trojan-turned-botnet that primarily spread via emails, has raised its head after a hiatus of 10 months. Emotet made headlines when Europol announced...
Trickbot Malware

Trickbot Remains the Most Prevalent Malware

0
The evolution of new malware variants has become prevalent in the cyberthreat landscape. Cybercriminals continue to create novel malicious codes, botnets, or redesign old...
HTML Smuggling

HTML Smuggling – A Novel Malware Deploying Technique

0
Like creating various malware variants, cybercriminals often find new techniques to deploy malware and evade security scans. As per a report from Microsoft 365...
Cyber Espionage Campaign Naikon APT

Sideloading: A New Malware Delivery Method via Spam Email

0
Cybercriminals often rely on different malware campaigns to exploit new vulnerabilities and break into critical network systems. The latest security research from the Mimecast...

MOST POPULAR

RECENT POSTS

Cybersec Europe

HackVSIT 6.0

CyberX Bahrain

Infosecurity Europe