Home Search
microsoft - search results
If you're not happy with the results, please do another search
How Attackers Are Using SEO Poisoning to Deliver ‘SolarMarker’ Remote Access Trojan
From malicious email attachments to weaponized PDFs, cybercriminals leverage various traps to target unwitting victims. At times, threat actors rely on old hacking techniques...
The Vulnerabilities that Open the Door to Ransomware
The Darkside ransomware group brought the Colonial Pipeline to its knees in May 2021. In another incident that soon followed, REvil (Ransomware Evil), a...
New Cyber Espionage Group ‘BackdoorDiplomacy’ Found Targeting Diplomats and Telcos in Africa and ME
Cybercriminals often leverage sophisticated deceptive techniques to evade detection from federal agencies. Many international cyberespionage campaigns were uncovered after they exploited the target or...
Are You Ready for Risk Quantification?
Are you ready for risk quantification? Follow this decision tree to understand if you’re ready for risk quantification today – or if not, what...
This is How Credential Phishing is Used to Compromise Email Accounts
Despite stricter regulations over data protection globally, protecting user data has become increasingly essential. Ever wondered what happens to compromised accounts, how your leaked...
Top 5 Cybersecurity Trends Businesses Should be Aware of in 2021
2020 will go down in the annals of corporate history as a game-changing year. Even now, as we slowly begin to emerge from a...
French Regulator Fines Google €220 Mn for Unfair Advertising Practices
The enactment of GDPR has had a far-reaching impact on businesses of all kinds across the globe. However, GDPR compliance has made life more...
4 Immediate Measures to Execute After a Cyberattack
Whether it is a global pandemic or the new normal, cybercriminals always find ways to target organizations and individuals for valuable digital assets. Most...
How SolarWinds Hackers ‘Nobelium’ Used Constant Contact in Mass Phishing Campaign
Nation state-backed cyberattacks have become widespread more than ever. They often leave a bad impression on the cybersecurity readiness of a nation. For instance,...
Fujitsu’s “ProjectWEB” Stands Suspended Amid Japanese Government Hacks
Just a couple of weeks ago, fearing a repeat of the Colonial Pipeline-like hack, Japan had announced stringent regulations for critical services in the...