The world during the pandemic prepares many surprises for us. Most of them are certainly unpleasant: health risks, inability to travel or meet old friends. One of these unpleasant surprises awaited us in the early spring, when the organizing team of the beloved SAS conference were forced to announce that the event would be postponed…
Researchers say that the campaign sidesteps end user detection and security solutions.
In addition to Windows and Linux machines, a new variant of the malware now targets Mac and Android devices.
Attackers gain read-only permissions to snoop around Office 365 accounts, including emails, contacts and more.
The Android malware comes from threat group APT-C-23, also known as Two-Tailed Scorpion and Desert Scorpion.
The cybercrooks spread the COVID-19 relief scam via Telegram and WhatsApp, and ultimately harvest account credentials and even pics of IDs.
Despite Microsoft issuing patches almost eight months ago, 61 percent of Exchange servers are still vulnerable.
Popular ‘safe browsing’ padlocks are now passe as a majority of bad guys also use them.
The attempted compromises, which could allow full control over Active Directory identity services, are flying thick and fast just a week after active exploits of CVE-2020-1472 were first flagged.
Botnets and IoT devices are forming a perfect storm for IT staff wrestling with WFH employee security.