Home Search
microsoft - search results
If you're not happy with the results, please do another search
Stay Ahead of Cyberattacks with Virtual Cybersecurity
Digital technologies have become akin to lifelines to many companies, with the initial onset of the pandemic crippling many aspects of business activities and...
How to Remove Single Points of Failure from your Digital Infrastructure
On 24th August, 79AD, the eruption of Mount Vesuvius caught the 20,000 local residents of Pompeii off guard, burying the magnificent Roman trading town...
Telegram Bots and Google Forms: The New Phishing Tools of Cybercriminals
In January 2021, the phone numbers of Facebook’s 533 million users went on sale on the online messaging platform, Telegram. Cybercriminals are known to...
CISO MAG’s April 2021 Issue Highlights Attack Vectors with COVID and Vaccine Themes
It would not be an exaggeration to say that COVID-19 vaccines are the most sought-after commodity today. Vaccine producers are working overtime to produce...
The 7 Steps of Ethical Hacking
To beat hackers at their own game, you need to think like them. They’re going to probe your software systems to find security vulnerabilities;...
Airtel to Provide Cybersecurity Services After CERT-IN Empanelment
Bharti Airtel, a popular telecommunications provider in India, has been selected by the Indian Computer Emergency Response Team (CERT-IN) to offer its cybersecurity solutions...
Malware Intrusion Disrupts Honeywell’s “Limited” IT Systems
On March 23, Honeywell, a well-known U.S.-based industrial tech giant, revealed that it was under a malware attack. The firsthand account states that the...
Wait! Read This Before You Post a Story on Instagram
Instagram is currently hands-down one of the most popular photo-sharing platforms in the world. With more than 1 billion users (1.16 billion as of...
Five Social Engineering Trends to Watch for 2021
Cybercrime continues to be a growing threat and attack methods constantly evolve with each passing day. At the core of almost every successful cyberattack,...
Borderless Cyberattacks Among Bordering Nations Soar
Whenever we read about state-sponsored threat actors, the two countries that strike our minds are Russia and China. Government-motivated cybercriminal groups from these countries...