Home Search

microsoft - search results

If you're not happy with the results, please do another search
User Verification Policy, zero trust approach

How to Detect Weak Passwords Using Google Chrome

0
Your online security is highly dependent on your password habits. Using a strong password or passphrase will provide maximum security to your network and...
Phishing, phishing attacks

Hackers Evade Secure Email Gateways via Advanced Phishing Attacks

0
Cybercriminals are increasingly leveraging social engineering scams via sophisticated phishing techniques. According to a research from Ironscales, nearly 50% of all advanced phishing attacks...

CSPs Need to Adopt Smarter Ways to Combat Evolving DDoS Attacks

0
Donny Chong is the Product Director at Nexusguard. He is responsible for designing the company's solutions for the enterprise. His broad ten-year tenure includes...
Doxing attacks

High-Profile Personalities on Hacker Radar! Attackers Target Munich Conference Attendees

0
Microsoft's threat intelligence center uncovered a cyberthreat operation in which hackers disguised as conference organizers to target more than 100 high-worth profiles, including heads...
NCSC

Vulnerability Alert: NCSC Warns U.K. Organizations About SharePoint Flaw

0
The National Cyber Security Centre (NCSC) in the U.K. has warned about a new remote code execution vulnerability (CVE–2020–16952), which affects Microsoft’s SharePoint products....
Google

Fragomen’s Data Breach Exposes Google Employees’ Personal Data

0
Fragomen, Del Rey, Bernsen & Loewy, an immigration law firm in the U.S., revealed a data breach that exposed personal information of current and...
credential-based attacks

Credential-based Attacks are on the Rise: Is Your Organization Prepared to Fight Them?

0
Every year, National Cyber Security Awareness Month provides organizations with the opportunity to examine the major issues faced by security teams and arm themselves...
Google

Google is the Monopoly Gatekeeper to the Internet, says DoJ

0
The U.S. Department of Justice (DoJ) filed a civil antitrust lawsuit against Google for unlawfully maintaining monopolies via anticompetitive practices in the search and...
phishing scam, fake CV phishing scam

Social Engineering: Life Blood of Data Exploitation (Phishing)

0
What do Jeffrey Dahmer, Ted Bundy, Wayne Gacy, Dennis Rader, and Frank Abigail all have in common, aside from the obvious fact that they...
cybersecurity practices, Automotive Cybersecurity

How Hardware Security is Getting Weaker as the Industry Changes its Cybersecurity Models

0
Cybersecurity in the last few years has become one of the biggest challenges in the computing world as the impact of cyber compromises has...