Home Search

microsoft - search results

If you're not happy with the results, please do another search
Armor Piercer

New Cyber Campaign “Armor Piercer” Targets Indian Government Officials

0
Cyberattacks and malicious campaigns are becoming rampant, with new cybercriminal operations being reported more often in the security landscape. Recently, security experts from Cisco...
paying ransom, Conti Ransomware Attacks

Conti Ransomware Attacks on Rise – CISA, FBI, NSA Issue Joint Alert

0
Increased use of Conti ransomware in more than 400 attacks on the U.S. and international organizations has been observed by the Cybersecurity and Infrastructure...
microsoft, flaws in SonicWall SRA SMA

Russian Turla APT Group Uses New Backdoor for Attacks

0
A new backdoor used by the Russian Turla APT group to keep the attacks live has been discovered, which has been reported to be...
Modern CISO

A Day in the Life of a Modern CISO

0
Over the last two decades, the role of a CISO has gained significant importance for businesses. The life of a CISO can vary quite...
Trilateral Security Partnership

Australia, U.K., and U.S. Come Together in a Trilateral Security Partnership

0
While the cyberthreat landscape is crossing boundaries, multiple nations are coming together to safeguard the cybersecurity landscape. Australia, the U.K., and the U.S. recently...
Malware and Vulnerability Trends Report, Mobile malware threats

Malware and Vulnerability Trends Report: High-risk Vulnerabilities in Corporate Software Frequently Targeted

0
Since devices are connected to the internet more than ever before, exploiting vulnerabilities to cross privilege boundaries has become common. Recently, Recorded Future and...
Healthcare IoT, Fitness Trackers

61 Mn Fitness Tracking Records Leaked via Unsecured GetHealth Database

0
The rise of IoT devices in the health care sector led to various potential cyber risks. The usage of wearable devices like fitness bands...
Man-in-the-Middle Attack

What is Man-in-the-Middle Attack and How to Prevent them

0
Man-in-the-middle (MITM) attacks are gaining importance in the cyberattack landscape as threat actor groups are leveraging it more often to harvest users’ sensitive data...
Remote Security Policy, Remote Work Jeopardizes Corporate Network Security: Report

Overcoming the Challenges of Executing a Remote Security Policy

0
Gartner estimates that around 30% of workers in India will be remote in 2022. While the penetration might be low compared to the U.S.,...
Microsoft November 2021 Patch Tuesday, Windows 10, Microsoft PrintNightmare

Zero-day Vulnerability in Windows MSHTML Exploited

0
An unpatched Windows 10 vulnerability has been exploited once again and the bounty shared on hacking forums. A security advisory from Redmond shares that...