Home Search

microsoft - search results

If you're not happy with the results, please do another search
Data breach in 100 U.S. cities

2.7 Billion Email Addresses Exposed Online

0
Researchers noticed a huge database containing email addresses and passwords left online without password protection. A joint investigation by cybersecurity firm Comparitech and security researcher...
biggest data breaches in India,data breach, Aptoide Android App Admits Data Breach, Suspends Sign-Up Option Temporarily, Panasonic

Around 100 Dentist Offices Affected by Sodinokibi Ransomware

0
Complete Technology Solutions (CTS), a Colorado-based IT services provider to oral-care practices, have reportedly been affected by a “Sodinokibi” ransomware attack. According to security researcher...
BLAZINGSUN: A New Breach on Joker’s Stash Dark Web

Buer, a New Loader Discovered in Several Malware Campaigns

0
Since the end of August 2019, researchers at Proofpoint have been tracking a new loader dubbed as ‘Buer’. It is said to use C...
future of endpoint management

The Future of Endpoint Management is Cognitive

0
By Vaidyanathan Iyer, Security Software Leader, IBM India/South Asia Today, the biggest test chief information security officers (CISOs) face is to find the perfect balance...
BotenaGo, malware over encrypted connections

Around 61 percent Malware ads Target Windows OS: Devcon

0
Security researchers revealed that most Malvertising campaigns (malicious ads) target the Windows platform more often than any other operating system. According to the analysis by...
ransomware, fonix, fonix ransomware, Cybereason Partners with Intel for Hardware-Enabled Ransomware Prevention, Kronos

RIplace – A Security Evading Ransomware Technique

0
Nyotron’s research team has discovered a new ransomware technique that goes undetected in most antivirus, anti-ransomware and Endpoint Detection and Response (EDR) solutions. The...

“It’s a war and the well-prepared one will win”

0
Ahmed Nabil has more than 17 years of experience in the field of Information Technology/Systems, Infrastructure, Project Management, Information Security, Application development/Automation, and IT management. He...
Horangi Raises US$20 Million in Funding to Strengthen Cybersecurity in Southeast Asia

Hacker Offers US$ 100K in BTC to Hack Corporate Companies

0
Phineas Fisher, a popular vigilante hacker recently announced a new kind of bug bounty program “Hacktivist Bug Hunting Program” to reward hackers who do...

RAT Attack: Double Whammy

0
A new malware recently surfaced with a very low detection rate and capability of delivering multiple Trojans to infect computers. The researchers from Fortinet...
active directory

Gone Phishing: Stealth Hits the Corner Office

0
By Alex Artamonov, Systems Engineer and Cybersecurity Specialist, Infinitely Virtual Mimicking the boss, in most organizations, is the very definition of insubordination. But ordering supplies or a...