Home Search
microsoft - search results
If you're not happy with the results, please do another search
How to Detect Weak Passwords Using Google Chrome
Your online security is highly dependent on your password habits. Using a strong password or passphrase will provide maximum security to your network and...
Hackers Evade Secure Email Gateways via Advanced Phishing Attacks
Cybercriminals are increasingly leveraging social engineering scams via sophisticated phishing techniques. According to a research from Ironscales, nearly 50% of all advanced phishing attacks...
CSPs Need to Adopt Smarter Ways to Combat Evolving DDoS Attacks
Donny Chong is the Product Director at Nexusguard. He is responsible for designing the company's solutions for the enterprise. His broad ten-year tenure includes...
High-Profile Personalities on Hacker Radar! Attackers Target Munich Conference Attendees
Microsoft's threat intelligence center uncovered a cyberthreat operation in which hackers disguised as conference organizers to target more than 100 high-worth profiles, including heads...
Vulnerability Alert: NCSC Warns U.K. Organizations About SharePoint Flaw
The National Cyber Security Centre (NCSC) in the U.K. has warned about a new remote code execution vulnerability (CVE–2020–16952), which affects Microsoft’s SharePoint products....
Fragomen’s Data Breach Exposes Google Employees’ Personal Data
Fragomen, Del Rey, Bernsen & Loewy, an immigration law firm in the U.S., revealed a data breach that exposed personal information of current and...
Credential-based Attacks are on the Rise: Is Your Organization Prepared to Fight Them?
Every year, National Cyber Security Awareness Month provides organizations with the opportunity to examine the major issues faced by security teams and arm themselves...
Google is the Monopoly Gatekeeper to the Internet, says DoJ
The U.S. Department of Justice (DoJ) filed a civil antitrust lawsuit against Google for unlawfully maintaining monopolies via anticompetitive practices in the search and...
Social Engineering: Life Blood of Data Exploitation (Phishing)
What do Jeffrey Dahmer, Ted Bundy, Wayne Gacy, Dennis Rader, and Frank Abigail all have in common, aside from the obvious fact that they...
How Hardware Security is Getting Weaker as the Industry Changes its Cybersecurity Models
Cybersecurity in the last few years has become one of the biggest challenges in the computing world as the impact of cyber compromises has...