Search Results for: Microsoft Office Blog Post Proofpoint and Microsoft Office 365 Fail in Latest COVID-19 Phishing Campaign April 2, 2020 Proofpoint and Microsoft Office 365 advanced threat protections (ATPs) are considered as top email protection though, an effective spoofing campaign... Blog Post Avoiding Multi-Factor Authentication – What Can You Do Against It? December 22, 2020 Multi-factor authentication refers to the practice of authenticating users using more than one identity verification methods. An email or username... Blog Post Securing Your Move to Microsoft Office 365 August 1, 2019 More and more organizations are moving their email services to Microsoft Office 365 (O365). When moving services to the cloud,... Blog Post 10 Best Practices for Your Firm with Microsoft 365. All the Microsoft Security Products are Listed Here! April 8, 2020 Microsoft Office 365 – how can we function in the professional and academic world without it? It provides Outlook, Word,... Blog Post 16 Top Security Vulnerabilities Since 2016 January 6, 2020 In the study done by the National Vulnerability Database (NVD), it shows that people can averagely discover approximately 45 new... Blog Post How to Decrypt the Files Encrypted by the Hive Ransomware February 24, 2022 South Korean researchers published an academic paper that presents a method to decrypt the files encrypted by the Hive Ransomware... Blog Post NSA and CISA Warn About Russian GRU Brute-Force Cyberattacks against US, Global Organizations August 3, 2021 Recently, top US security agencies warn about the wave of brute-force cyberattacks by the Russian military intelligence agency named GRU.... Blog Post MacOS Faces Threats From Rewritten Malware August 30, 2021 For a while, one of the most significant benefits of macOS X over Windows OS has been the scarcity of... Blog Post Lemon Duck Hacking Group Adopts Microsoft Exchange Server Vulnerabilities in New Attacks May 26, 2021 A hacking group called Lemon Duck has engaged itself in exploiting Microsoft Exchange Server vulnerabilities and using decoy TLDs (top-level... Blog Post Analysis of TrickBot Malware – the most prolific COVID-19 themed malware July 23, 2020 In this article you will learn about: Distribution techniques of TrickBot malware Different modules and tasks of the TrickBot payload ... Blog Post Types of SSL Certificates – Why Should You Care? November 20, 2020 Are you in a process of creating your own webpage or do you already have one or two? Then, you... Newsletter Top 2018 Cyber Exploits Involve Microsoft Office November 13, 2018 Blog Post What is Fileless Malware? How Does it Work? November 6, 2020 As the name suggests, fileless malware does not rely on any physical files being transferred and stored on the infected... Blog Post The latest ransomware: Kupidon ransomware July 6, 2020 The latest ransomware called Kupidon has been discovered by MalwareHunterTeam. The virus targets both personal and corporate networks to steal... Blog Post Microsoft’s Multi-Factor Authentication Failure Impacts Office 365 Users Globally November 19, 2018 A failure of Microsoft’s multi-factor authentication services has impacted Office 365 business users in the early hours of Monday. The...
Blog Post Proofpoint and Microsoft Office 365 Fail in Latest COVID-19 Phishing Campaign April 2, 2020 Proofpoint and Microsoft Office 365 advanced threat protections (ATPs) are considered as top email protection though, an effective spoofing campaign...
Blog Post Avoiding Multi-Factor Authentication – What Can You Do Against It? December 22, 2020 Multi-factor authentication refers to the practice of authenticating users using more than one identity verification methods. An email or username...
Blog Post Securing Your Move to Microsoft Office 365 August 1, 2019 More and more organizations are moving their email services to Microsoft Office 365 (O365). When moving services to the cloud,...
Blog Post 10 Best Practices for Your Firm with Microsoft 365. All the Microsoft Security Products are Listed Here! April 8, 2020 Microsoft Office 365 – how can we function in the professional and academic world without it? It provides Outlook, Word,...
Blog Post 16 Top Security Vulnerabilities Since 2016 January 6, 2020 In the study done by the National Vulnerability Database (NVD), it shows that people can averagely discover approximately 45 new...
Blog Post How to Decrypt the Files Encrypted by the Hive Ransomware February 24, 2022 South Korean researchers published an academic paper that presents a method to decrypt the files encrypted by the Hive Ransomware...
Blog Post NSA and CISA Warn About Russian GRU Brute-Force Cyberattacks against US, Global Organizations August 3, 2021 Recently, top US security agencies warn about the wave of brute-force cyberattacks by the Russian military intelligence agency named GRU....
Blog Post MacOS Faces Threats From Rewritten Malware August 30, 2021 For a while, one of the most significant benefits of macOS X over Windows OS has been the scarcity of...
Blog Post Lemon Duck Hacking Group Adopts Microsoft Exchange Server Vulnerabilities in New Attacks May 26, 2021 A hacking group called Lemon Duck has engaged itself in exploiting Microsoft Exchange Server vulnerabilities and using decoy TLDs (top-level...
Blog Post Analysis of TrickBot Malware – the most prolific COVID-19 themed malware July 23, 2020 In this article you will learn about: Distribution techniques of TrickBot malware Different modules and tasks of the TrickBot payload ...
Blog Post Types of SSL Certificates – Why Should You Care? November 20, 2020 Are you in a process of creating your own webpage or do you already have one or two? Then, you...
Blog Post What is Fileless Malware? How Does it Work? November 6, 2020 As the name suggests, fileless malware does not rely on any physical files being transferred and stored on the infected...
Blog Post The latest ransomware: Kupidon ransomware July 6, 2020 The latest ransomware called Kupidon has been discovered by MalwareHunterTeam. The virus targets both personal and corporate networks to steal...
Blog Post Microsoft’s Multi-Factor Authentication Failure Impacts Office 365 Users Globally November 19, 2018 A failure of Microsoft’s multi-factor authentication services has impacted Office 365 business users in the early hours of Monday. The...