Home Search
microsoft - search results
If you're not happy with the results, please do another search
2.7 Billion Email Addresses Exposed Online
Researchers noticed a huge database containing email addresses and passwords left online without password protection.
A joint investigation by cybersecurity firm Comparitech and security researcher...
Around 100 Dentist Offices Affected by Sodinokibi Ransomware
Complete Technology Solutions (CTS), a Colorado-based IT services provider to oral-care practices, have reportedly been affected by a “Sodinokibi” ransomware attack.
According to security researcher...
Buer, a New Loader Discovered in Several Malware Campaigns
Since the end of August 2019, researchers at Proofpoint have been tracking a new loader dubbed as ‘Buer’. It is said to use C...
The Future of Endpoint Management is Cognitive
By Vaidyanathan Iyer, Security Software Leader, IBM India/South Asia
Today, the biggest test chief information security officers (CISOs) face is to find the perfect balance...
Around 61 percent Malware ads Target Windows OS: Devcon
Security researchers revealed that most Malvertising campaigns (malicious ads) target the Windows platform more often than any other operating system.
According to the analysis by...
RIplace – A Security Evading Ransomware Technique
Nyotron’s research team has discovered a new ransomware technique that goes undetected in most antivirus, anti-ransomware and Endpoint Detection and Response (EDR) solutions. The...
“It’s a war and the well-prepared one will win”
Ahmed Nabil has more than 17 years of experience in the field of Information Technology/Systems, Infrastructure, Project Management, Information Security, Application development/Automation, and IT management. He...
Hacker Offers US$ 100K in BTC to Hack Corporate Companies
Phineas Fisher, a popular vigilante hacker recently announced a new kind of bug bounty program “Hacktivist Bug Hunting Program” to reward hackers who do...
RAT Attack: Double Whammy
A new malware recently surfaced with a very low detection rate and capability of delivering multiple Trojans to infect computers. The researchers from Fortinet...
Gone Phishing: Stealth Hits the Corner Office
By Alex Artamonov, Systems Engineer and Cybersecurity Specialist, Infinitely Virtual
Mimicking the boss, in most organizations, is the very definition of insubordination. But ordering supplies or a...