Search Results for: Microsoft Teams Blog Post Microsoft Teams vulnerability could let attackers hijack user accounts April 28, 2020 Microsoft has issued an emergency patch to all versions of Windows in order to patch a vulnerability revealed after the recent Hacking Team breach. Blog Post Secure Applications Make Mobile Forensics More Difficult October 25, 2019 Encryption apps are making mobile forensics harder than before. As phone providers and developers shift towards greater user privacy and... Blog Post Securing Your Move to Microsoft Office 365 August 1, 2019 More and more organizations are moving their email services to Microsoft Office 365 (O365). When moving services to the cloud,... Blog Post Netgear Authentication Bypass Open Up the Possibility of Router Takeover August 17, 2021 Microsoft researchers have disclosed multiple authentication bypass vulnerabilities in Netgear routers. These vulnerabilities open the possibility of total control over... Blog Post Microsoft Issued a Warning to Its Azure Customers of a Flaw That Might Allow Hackers to Access Data September 23, 2021 On September 8, 2021, Microsoft issued a warning to its Azure customers) cloud computing customers) of a vulnerability. In essence,... Blog Post Microsoft Reveals Critical Bugs Allowing Takeover of NETGEAR Routers July 21, 2021 Microsoft has revealed critical bugs regarding NETGEAR routers that could cause data leaks and system compromise. More particularly, researchers from... Blog Post Exchange/Outlook Autodiscover Bug Spills 100K+ Email Passwords October 20, 2021 A study conducted by Guardicore security researcher Amit Serper recently demonstrated the potential for large-scale credentials compromise owing to a... Blog Post Microsoft Released the First Patch Tuesday of 2021 for Defender Zero-Day and 82 Other Windows Flaws January 26, 2021 Recently, Microsoft has released security updates for 83 flaws in total on the first Patch Tuesday of 2021. The fixes... Blog Post Chinese Hackers Compromising Critical Flaws in Microsoft Exchange Servers March 9, 2021 The U.S. Cybersecurity and Infrastructure Security Agency (CISA) issued a red warning for the users of the Microsoft Exchange email... Blog Post Russian Malware Disrupted Ukrainian Organizations Before Invasion March 2, 2022 Based on an alert posted by CISA on February 26, Russian-backed threat actors targeted a host of significant Ukrainian organizations, aiming to... Blog Post Log4j Vulnerability Causes Panic Across the Internet December 14, 2021 The Log4j zero-day vulnerability is a considerable risk for internet security. Companies worldwide are scrambling to update their servers and... Blog Post Attackers Exploiting Companies That Use Advanced VPNs November 19, 2021 Virtual Private Networks (VPNs) have long been an essential part in the operation of modern businesses. They have recently become... Blog Post Cyber Attackers Using Google Chrome to Steal User Data and Credentials November 17, 2021 With Windows’s User Account Control (UAC), malware is exceedingly difficult to spread since UAC runs all apps in the non-administrative... Blog Post A Detailed Analysis of WhisperGate Targeting Ukrainian Organizations January 20, 2022 Microsoft reported evidence of destructive malware targeting organizations in Ukraine starting from January 13 [1]. The LIFARS threat intelligence team... Blog Post REvil Ransomware Kaseya Supply-Chain Attack Summary July 12, 2021 REvil Ransomware Kaseya: Ransomware attacks on Colonial Pipeline, JBS Foods, Kaseya and other major organizations are in the headlines, and...
Blog Post Microsoft Teams vulnerability could let attackers hijack user accounts April 28, 2020 Microsoft has issued an emergency patch to all versions of Windows in order to patch a vulnerability revealed after the recent Hacking Team breach.
Blog Post Secure Applications Make Mobile Forensics More Difficult October 25, 2019 Encryption apps are making mobile forensics harder than before. As phone providers and developers shift towards greater user privacy and...
Blog Post Securing Your Move to Microsoft Office 365 August 1, 2019 More and more organizations are moving their email services to Microsoft Office 365 (O365). When moving services to the cloud,...
Blog Post Netgear Authentication Bypass Open Up the Possibility of Router Takeover August 17, 2021 Microsoft researchers have disclosed multiple authentication bypass vulnerabilities in Netgear routers. These vulnerabilities open the possibility of total control over...
Blog Post Microsoft Issued a Warning to Its Azure Customers of a Flaw That Might Allow Hackers to Access Data September 23, 2021 On September 8, 2021, Microsoft issued a warning to its Azure customers) cloud computing customers) of a vulnerability. In essence,...
Blog Post Microsoft Reveals Critical Bugs Allowing Takeover of NETGEAR Routers July 21, 2021 Microsoft has revealed critical bugs regarding NETGEAR routers that could cause data leaks and system compromise. More particularly, researchers from...
Blog Post Exchange/Outlook Autodiscover Bug Spills 100K+ Email Passwords October 20, 2021 A study conducted by Guardicore security researcher Amit Serper recently demonstrated the potential for large-scale credentials compromise owing to a...
Blog Post Microsoft Released the First Patch Tuesday of 2021 for Defender Zero-Day and 82 Other Windows Flaws January 26, 2021 Recently, Microsoft has released security updates for 83 flaws in total on the first Patch Tuesday of 2021. The fixes...
Blog Post Chinese Hackers Compromising Critical Flaws in Microsoft Exchange Servers March 9, 2021 The U.S. Cybersecurity and Infrastructure Security Agency (CISA) issued a red warning for the users of the Microsoft Exchange email...
Blog Post Russian Malware Disrupted Ukrainian Organizations Before Invasion March 2, 2022 Based on an alert posted by CISA on February 26, Russian-backed threat actors targeted a host of significant Ukrainian organizations, aiming to...
Blog Post Log4j Vulnerability Causes Panic Across the Internet December 14, 2021 The Log4j zero-day vulnerability is a considerable risk for internet security. Companies worldwide are scrambling to update their servers and...
Blog Post Attackers Exploiting Companies That Use Advanced VPNs November 19, 2021 Virtual Private Networks (VPNs) have long been an essential part in the operation of modern businesses. They have recently become...
Blog Post Cyber Attackers Using Google Chrome to Steal User Data and Credentials November 17, 2021 With Windows’s User Account Control (UAC), malware is exceedingly difficult to spread since UAC runs all apps in the non-administrative...
Blog Post A Detailed Analysis of WhisperGate Targeting Ukrainian Organizations January 20, 2022 Microsoft reported evidence of destructive malware targeting organizations in Ukraine starting from January 13 [1]. The LIFARS threat intelligence team...
Blog Post REvil Ransomware Kaseya Supply-Chain Attack Summary July 12, 2021 REvil Ransomware Kaseya: Ransomware attacks on Colonial Pipeline, JBS Foods, Kaseya and other major organizations are in the headlines, and...