Home Search
microsoft - search results
If you're not happy with the results, please do another search
Operation North Star: A New Phishing Campaign Disguised as Job Posting
McAfee’s advanced threat research team discovered a new phishing campaign linked to the North Korean hackers targeting the U.S. defense and aerospace sectors with...
Update Now! Dell EMC Releases Patch for iDRAC Path Traversal Vulnerability
Technology giant Dell EMC issued a security patch for a path traversal vulnerability found in the Integrated Dell Remote Access Controller (iDRAC) that could...
How Threat Actors Exploited Google Cloud to Launch Phishing Attacks
The world today is increasingly digital. And with rapid digital transformation and technology adoption, hackers are misusing the situation with more targeted attacks. A...
121.4 Million Ransomware Attacks Recorded in the First Half of 2020
A survey from cybersecurity firm SonicWall revealed that the opportunistic use of COVID-19 pandemic by cybercriminals has resulted in the rise of ransomware and...
Why You Should Avoid Social Logins and SSO
The Twitter accounts of top celebrities were recently hacked. You could be the next victim, only to be locked out of your Twitter account....
Navigating Cybersecurity in the New Normal
The worldwide COVID-19 pandemic has forced governments, organizations, and individuals to step up their capacities and make significant changes in how they work and...
Bitcoin Scammers Hack Twitter Accounts of Jeff Bezos, Bill Gates, Apple, and Many More
In a lethal strike to Twitter, Bitcoin scammers successfully hacked official accounts of many known personalities and brands to scam people into believing their...
Hackers Target Office 365 Users with SurveyMonkey Phishing Campaign
Security researchers from Abnormal Security discovered a new phishing campaign targeting Microsoft Office 365 users via a legitimate SurveyMonkey domain to evade security filters....
3 Ways to Solve the Cybersecurity Talent Gap
The cybersecurity talent gap is well documented and well-known throughout the cybersecurity industry. Not surprisingly, CISOs believe this problem will continue to worsen resulting...
Hackers Hide Phishing Links Inside .ics Calendar Invitations
Threat actors are finding innovative methods to phish people into clicking/downloading malicious links or entering sensitive information on fake forms. In a recent security...