Home Search

microsoft - search results

If you're not happy with the results, please do another search
Google WebAuthn, Google, WebAuthn, web authentication

Google Chrome OS Update: No Passwords, Only Fingerprint Required

0
WebAuthn, or web authentication, which has been regarded as an official web standard since 2019, has finally been introduced for passwordless authentication on Chromebooks....
Beware of these “fleeceware” VPN apps on Apple App Store, SonicWall hacked

SonicWall Hacked Through Zero-Day Vulnerabilities in its VPN Product

0
Cybersecurity firm SonicWall, popularly known to provide security products like firewall and VPN access tools, in the wee hours of Friday night disclosed that...
Experian API Flaw

How Data Protection Can Replace Network Protection in the WFH Era

0
Before the COVID-19 crisis, remote work was considered a luxury option for a relatively lucky few workers in select industries such as technology companies...
SolarWinds Microsoft

Malwarebytes Reports Being Hacked by SolarWinds Attackers

0
When we first reported about the SolarWinds attack in December 2020, we said it was just the tip of the iceberg, and now a...
FireEye’s Red Team tools breach

FireEye Releases ‘Azure AD Investigator’ to Know SolarWinds Hacking Techniques

0
The SolarWinds supply chain cyberattack took the digital world by storm, affecting government agencies and IT giants. To detail the techniques used by the SolarWinds threat...
Singapore cybersecurity

MAS Tightens Rules for Financial Firms in Singapore Post SolarWinds Cyberattack

0
The SolarWinds cyberattack has affected almost all the sectors around the globe. Taking into account the outreach and aftermath of the attack, the Monetary...
remote desktop protocol (rdp)

What is an RDP attack?

0
Remote Desktop Protocol (RDP) attacks are becoming a nightmare for CISOs, CIOs, CTOs, and network administrators. They are an attack vector to enterprise networks....
2021 Security Predictions

2021 Security Predictions: Endpoint Security is of Utmost Importance

0
2020 has been an unforgettable year – from a virus upending the world to a sudden shift to remote workforce, we have seen it...
Cryptocurrency Lazarus, North Korean TA406, Lazarus Group , Korea Atomic Energy Research Institute

North Korean APT37 Uses RokRAT Trojan to Target South Korea

0
Security researchers from Malwarebytes found that state-sponsored North Korean threat actor group APT37 is using RokRAT Trojan in a new wave of cyber operations...
Russian hackers, Senate Homeland Security Report, Electronic Warfare Associates

U.S. Federal Agencies Jointly Form Cyber Unified Coordination Group

0
The U.S. intelligence agencies including the National Security Council (NSC), the FBI, the Cybersecurity & Infrastructure Security Agency (CISA), and the Director of National...