SolarWinds cyberattack affects thousands of Microsoft users
Microsoft has just confirmed that it was affected by the recent SolarWinds hack, although it ruled out a supply chain compromise to infect its customers. A few days ago itRead More →
Data Security News | Infosec Blog | Information Security Tutorials
Microsoft has just confirmed that it was affected by the recent SolarWinds hack, although it ruled out a supply chain compromise to infect its customers. A few days ago itRead More →
This has probably been the most difficult year in a long time, with virtually all industries and services being impacted by the pandemic. Fortunately it is about to end, nonetheless,Read More →
Specialists from Ben-Gurion University, Israel, published an investigation describing an attack to turn any device’s RAM card into a wireless transmitter in order to receive sensitive data from air-gapped environmentsRead More →
Cybersecurity specialists reported the finding of a critical vulnerability in Orion Platform, the IT performance monitoring solution developed by tech company SolarWinds. According to the report, successful exploitation of thisRead More →
Even if you have never been the victim of an online fraud attempt or something similar, it is highly likely that access credentials for your email, social media or workRead More →
Millions of Microsoft Office 365 users around the world are exposed to a new malicious phishing campaign targeting employees of financial companies, healthcare services, insurers, manufacturing companies, telecommunications, and publicRead More →
Vulnerable deployments remain one of the main attack vectors. This time, pentesting experts from the International Institute of Cyber Security (IICS) present with clear examples one of the ways toRead More →
Public organizations and private companies around the world use website blocking tools as a simple method to prevent employees from wasting time on entertainment platforms, social media, or any otherRead More →
Tor browser developers are looking for a way to use “anonymous tokens” to stop denial-of-service (DoS) attacks, one of the biggest issues afflicting users on this network. Although it isRead More →
For several years the interception of mobile communications has become an important field for the defense industry. The “Five Eyes” group, an intelligence alliance between Australia, Canada, New Zealand, theRead More →