Home Search

microsoft - search results

If you're not happy with the results, please do another search
Nobelium

Russia-based APT28 Linked to Mass Brute-force Attacks Against Cloud Networks

0
State-sponsored actors from Russia have a long history of cyberattacks across the world. There are numerous cyberespionage campaigns linked to Russian hackers. Recently, the...
Jason Lee

“I am looking for people who are multipliers and who help everyone else get...

0
Hiring security professionals has taken a new turn today, compared to the pre-pandemic era. The IT organization is reassessing its workforce and making certain...
Harness Your System, Free Decryptor, federal government, cybersecurity

Sigh of Relief for Lorenz Ransomware Victims; Free Decryptor Released

0
Organizations become helpless when their digital assets are encrypted in the event of a ransomware attack, making it difficult for victim companies to recover...
American Cybersecurity Literacy Act

Rep. Veasey and Others Introduce American Cybersecurity Literacy Act to Mitigate Cyber Risks

0
Improving cybersecurity awareness among individuals could eventually help mitigate cyber risks. And educating users on different kinds of cyberattacks will make them act accordingly...
Android Trojan, Trojan, ReverseRat, Numando Banking Trojan

Pakistan-linked Hacker Suspected of Targeting Indian Power Companies with ReverseRat

0
Days after reports of cyberespionage campaigns by Chinese state-sponsored actors targeting the Indian power sector, security researchers uncovered a new cyber operation by suspected...
Government officials

Veeam Launches U.S. Federal Government-Focused Subsidiary – Veeam Government Solutions

0
Veeam Software, a modern-day data protection solution provider, has announced the launch of its new federal government-focused subsidiary, Veeam Government Solutions (VGS), Inc. Given...
Malware and Vulnerability Trends Report, Mobile malware threats

Process Ghosting: A New Executable Image Tampering Technique in the Wild

0
In addition to advancing hacking strategies, cybercriminals often try different tactics to evade security detections. In one such tactic discovered recently, security researchers from...
Forum of Incident Response and Security Teams

“We want to bring together incident response and security teams from every country”

0
The security community strives to mitigate zero-day attacks. Timely vulnerability disclosure and incident response/handling is the way to do this. But that depends on...
U.S.-Russia Summit

U.S.-Russia Summit: Biden Tells Putin “Critical Infrastructure Should Be Off-limits” to Cyberattacks

0
Cyber intrusions have existed for decades. They still do, however, much of the cyber espionage today comes from geopolitically-inclined state actors, impacting both governments...
Supply Chain vulnerabilities

Episode #11: Supply Chain Attacks and Vulnerability Disclosures

0
In the past year, we have seen accelerated adoption of digital platforms and technologies. For instance, more businesses and individuals are turning to e-commerce...