Home Search
microsoft - search results
If you're not happy with the results, please do another search
Russia-based APT28 Linked to Mass Brute-force Attacks Against Cloud Networks
State-sponsored actors from Russia have a long history of cyberattacks across the world. There are numerous cyberespionage campaigns linked to Russian hackers. Recently, the...
“I am looking for people who are multipliers and who help everyone else get...
Hiring security professionals has taken a new turn today, compared to the pre-pandemic era. The IT organization is reassessing its workforce and making certain...
Sigh of Relief for Lorenz Ransomware Victims; Free Decryptor Released
Organizations become helpless when their digital assets are encrypted in the event of a ransomware attack, making it difficult for victim companies to recover...
Rep. Veasey and Others Introduce American Cybersecurity Literacy Act to Mitigate Cyber Risks
Improving cybersecurity awareness among individuals could eventually help mitigate cyber risks. And educating users on different kinds of cyberattacks will make them act accordingly...
Pakistan-linked Hacker Suspected of Targeting Indian Power Companies with ReverseRat
Days after reports of cyberespionage campaigns by Chinese state-sponsored actors targeting the Indian power sector, security researchers uncovered a new cyber operation by suspected...
Veeam Launches U.S. Federal Government-Focused Subsidiary – Veeam Government Solutions
Veeam Software, a modern-day data protection solution provider, has announced the launch of its new federal government-focused subsidiary, Veeam Government Solutions (VGS), Inc. Given...
Process Ghosting: A New Executable Image Tampering Technique in the Wild
In addition to advancing hacking strategies, cybercriminals often try different tactics to evade security detections. In one such tactic discovered recently, security researchers from...
“We want to bring together incident response and security teams from every country”
The security community strives to mitigate zero-day attacks. Timely vulnerability disclosure and incident response/handling is the way to do this. But that depends on...
U.S.-Russia Summit: Biden Tells Putin “Critical Infrastructure Should Be Off-limits” to Cyberattacks
Cyber intrusions have existed for decades. They still do, however, much of the cyber espionage today comes from geopolitically-inclined state actors, impacting both governments...
Episode #11: Supply Chain Attacks and Vulnerability Disclosures
In the past year, we have seen accelerated adoption of digital platforms and technologies. For instance, more businesses and individuals are turning to e-commerce...