Home Search

microsoft - search results

If you're not happy with the results, please do another search
SEO poisoning

How Attackers Are Using SEO Poisoning to Deliver ‘SolarMarker’ Remote Access Trojan

0
From malicious email attachments to weaponized PDFs, cybercriminals leverage various traps to target unwitting victims. At times, threat actors rely on old hacking techniques...
Ransomware attacks, ransomware, Sinclair Broadcast group

The Vulnerabilities that Open the Door to Ransomware

0
The Darkside ransomware group brought the Colonial Pipeline to its knees in May 2021. In another incident that soon followed, REvil (Ransomware Evil), a...
Cyber Espionage Campaign Naikon APT

New Cyber Espionage Group ‘BackdoorDiplomacy’ Found Targeting Diplomats and Telcos in Africa and ME

0
Cybercriminals often leverage sophisticated deceptive techniques to evade detection from federal agencies. Many international cyberespionage campaigns were uncovered after they exploited the target or...
cybersecurity practices, Automotive Cybersecurity

Are You Ready for Risk Quantification?

0
Are you ready for risk quantification? Follow this decision tree to understand if you’re ready for risk quantification today – or if not, what...
Compromised Email Accounts

This is How Credential Phishing is Used to Compromise Email Accounts

0
Despite stricter regulations over data protection globally, protecting user data has become increasingly essential. Ever wondered what happens to compromised accounts, how your leaked...
return to office, business, hybrid work

Top 5 Cybersecurity Trends Businesses Should be Aware of in 2021

0
2020 will go down in the annals of corporate history as a game-changing year. Even now, as we slowly begin to emerge from a...
French Regulator Fined Google

French Regulator Fines Google €220 Mn for Unfair Advertising Practices

0
The enactment of GDPR has had a far-reaching impact on businesses of all kinds across the globe. However, GDPR compliance has made life more...
CEO, cybersecurity, CISO, Future of the CISO

4 Immediate Measures to Execute After a Cyberattack

0
Whether it is a global pandemic or the new normal, cybercriminals always find ways to target organizations and individuals for valuable digital assets. Most...
SolarWinds Microsoft

How SolarWinds Hackers ‘Nobelium’ Used Constant Contact in Mass Phishing Campaign

0
Nation state-backed cyberattacks have become widespread more than ever.  They often leave a bad impression on the cybersecurity readiness of a nation. For instance,...
Fujitsu ProjectWEB

Fujitsu’s “ProjectWEB” Stands Suspended Amid Japanese Government Hacks

0
Just a couple of weeks ago, fearing a repeat of the Colonial Pipeline-like hack, Japan had announced stringent regulations for critical services in the...