Network Security | News, how-tos, features, reviews, and videos
The Russia-sponsored APT group appears to have increased its activity in an attempt to leverage secrets gained from the Microsoft email breach discovered in January.
Not yet exploited, these flaws could allow malicious code to be placed on host systems from inside a virtual machine.
An initial access broker is able to grab authentication information when a victim opens the email attachments for access to Windows networks.
Phishing is a type of cyberattack that uses disguised email to trick the recipient into giving up information, downloading malware, or taking some other desired action.
Hacker group Midnight Blizzard utilized password spray attacks that successfully compromised legacy Microsoft emails. Here’s how to reinforce your defenses against these intrusions.
The vulnerability allows attackers to bypass Microsoft's Office Protected View mode.
The vulnerabilities could enable cross-site request forgery in Expressway products and denial-of-service attacks in ClamAV.
The phishing campaign bypasses anti-spoofing protections and is otherwise difficult to identify as malicious.
A business email compromise policy can guide and allow employees to feel safer by following pre-defined rules. Here are eight things that should be in an organization’s BEC policy.
Threat actors are already scanning the internet for vulnerable Jenkins servers after a proof of concept was published.