Home Search
Microsoft - search results
If you're not happy with the results, please do another search
Cloud Security: Challenges and Trends
With nearly 50% of the global corporate data being stored in the cloud, it is no surprise that cloud security has become an essential...
Why It Is Time to Go Beyond Passwords
Passwords are one of the most common techniques used to keep our information safe. However, with growing number of apps, it is not at...
How Blockchain and AI will Promote Industrial Growth: An Overview
Artificial Intelligence models will soon be combined with Blockchain frameworks to enable automated decision making and a greater scope for creating intelligent financial products....
NIOPDC Hack Cripples Gas Stations in Iran
The National Iranian Oil Products Distribution Company (NIOPDC) was out of service for a day due to a cyberattack that affected the entire distribution network....
Lone Wolf Campaign Targets India and Afghanistan with Commodity RATs
Cyberattacks and malware campaigns against India and its neighboring countries have increased exponentially. Recently, security experts Cisco Talos uncovered a new malware campaign targeting...
How To Find a Phishing Email [INFOGRAPHIC]
Protecting personal information from adversaries has become a challenge for both individuals and organizations. Cybercriminals are leveraging advanced phishing and social-engineering techniques to trick...
7 Tips for Implementing a Personnel Security Program
Why does it seem that some of the most important things in life are often those that are the most overlooked? For example, a...
Russia’s Critical Sectors Under APT Group ChamelGang’s Radar
The attack vector of Russian state-sponsored advanced persistent threat (APT) attackers is extended across various countries. Multiple cybercriminal groups from Russia have targeted several...
Rise in RAT Campaigns Illustrates Growing Malware Threat
Ransomware has made more than its fair share of headlines in the past 18 months. It has become a top priority for C-Suites and...
This Device Simplifies Password Management and Protects User Credentials
With a mission to provide cybersecurity to individuals to safeguard themselves from threat actors, a Pune-based (Maharashtra, India) cybersecurity enthusiast came up with a...