Microsoft
The most dangerous cyber security threats of 2023
December 27 by Olivia PowellThe threat vectors cyber security experts believe will pose the biggest risk to cyber security in 2023
IOTW: Microsoft links Raspberry Robin malware to hacking group EvilCorp
August 03 by Olivia PowellA USB-based worm first discovered in 2021 has been linked to activity by Russian hacking group EvilCorp
IOTW: BlackCat ransomware strikes Italian university
June 17 by Beth MaundrillBlackCat represents a trend in threats actors using ransomware-as-a-service to infiltrate organizations’ networks
Top five recent cyber-attacks you should know about
May 17 by Beth MaundrillFive recent cyber-attack that affected Sixt, Funky Pigeon, Mailchimp and Okta and how they unfolded
Everything you need to know about the Spring4Shell vulnerability
April 14 by Shannon FlynnThe recently uncovered Spring4Shell vulnerability bears a resemblance to Log4Shell
IOTW: Lapsus$ gang targets Microsoft and Okta
March 23 by Beth MaundrillTwo major technology organizations have confirmed breaches by the Lapsus$ hacker group
Incident Of The Week: Leak Discloses UN Data Breach From 2019
February 07 by Kayla MatthewsHackers broke into dozens of United Nations (UN) servers in July of last year, and UN officials kept quiet about it. The worst part? PII was stolen and employees were kept in the dark. Cyber Security...
Incident Of The Week: Misconfigured Servers Result In 250 Million Microsoft Customer Support Records Exposed
January 24 by Jeff OrrA misconfiguration applied to five Elasticsearch database servers in December 2019 led to the exposure of 250 million customer support records for software maker Microsoft. How should less sophisticat...
NSA Shares Vulnerability Discovered In Microsoft Windows 10 And Server Platforms
January 15 by Jeff OrrThe NSA discovered a certificate validation vulnerability in Windows 10 and Windows Server 2016/2019 software. Microsoft has issued a patch, which could affect more than 900 million systems using the...
Large Software Companies Using Data Privacy As A Competitive Advantage
December 03 by Jeff OrrOn the eve of CCPA legislation taking effect, large companies are extending protections under these laws to their U.S. customers. Cyber Security Hub enlisted the help of security and data privacy lega...
The Pros And Cons Of Enterprise Multi-Factor Authentication
November 07 by Jeff OrrA single, password-driven mechanism for user authentication is no longer effective. Using two or more factors (multi-factor authentication or MFA) remains the best practice, according to the FBI. But...
4 Ways To Defend The Enterprise From Nation-State Attacks
May 07 by Rebecca WynnCyber security strategies need to cover the full spectrum of possible attacks and events that could cause a crippling blow to a company’s operations which includes nation-state and the attacks on infr...