Home Search

microsoft - search results

If you're not happy with the results, please do another search
firewall

Stay Ahead of Cyberattacks with Virtual Cybersecurity

0
Digital technologies have become akin to lifelines to many companies, with the initial onset of the pandemic crippling many aspects of business activities and...
User Verification Policy, zero trust approach

How to Remove Single Points of Failure from your Digital Infrastructure

0
On 24th August, 79AD, the eruption of Mount Vesuvius caught the 20,000 local residents of Pompeii off guard, burying the magnificent Roman trading town...
phishing, Telegram bots and Google Forms used for phishing

Telegram Bots and Google Forms: The New Phishing Tools of Cybercriminals

0
In January 2021, the phone numbers of Facebook’s 533 million users went on sale on the online messaging platform, Telegram. Cybercriminals are known to...

CISO MAG’s April 2021 Issue Highlights Attack Vectors with COVID and Vaccine Themes

0
It would not be an exaggeration to say that COVID-19 vaccines are the most sought-after commodity today. Vaccine producers are working overtime to produce...

The 7 Steps of Ethical Hacking

0
To beat hackers at their own game, you need to think like them. They’re going to probe your software systems to find security vulnerabilities;...

Airtel to Provide Cybersecurity Services After CERT-IN Empanelment

0
Bharti Airtel, a popular telecommunications provider in India, has been selected by the Indian Computer Emergency Response Team (CERT-IN) to offer its cybersecurity solutions...
Armor Piercer

Malware Intrusion Disrupts Honeywell’s “Limited” IT Systems

0
On March 23, Honeywell, a well-known U.S.-based industrial tech giant, revealed that it was under a malware attack. The firsthand account states that the...
Instagram

Wait! Read This Before You Post a Story on Instagram

0
Instagram is currently hands-down one of the most popular photo-sharing platforms in the world. With more than 1 billion users (1.16 billion as of...
Threat Alert! Attackers Use Malicious Email Accounts to Launch BEC Attacks

Five Social Engineering Trends to Watch for 2021

0
Cybercrime continues to be a growing threat and attack methods constantly evolve with each passing day. At the core of almost every successful cyberattack,...
U.S.-Russia Summit

Borderless Cyberattacks Among Bordering Nations Soar

0
Whenever we read about state-sponsored threat actors, the two countries that strike our minds are Russia and China. Government-motivated cybercriminal groups from these countries...