Security pros discuss the most typical ways attackers leverage Microsoft 365 and share their guidance for defenders.
Read moreThe DarkSide Ransomware Gang
June 2 2021
The New York Times has a long story on the DarkSide ransomware gang.
A glimpse into DarkSide’s secret communications in the months leading up to the Colonial Pipeline attack...
Read more
Many nation-state-backed attacks are intended to destabilize the US government, not steal from it.
Read moreResearchers create a processor that uses encryption to modify its memory architecture during runtime, making it very difficult for hackers to exploit memory-based vulnerabilities.
Read moreIf your password gets stolen as part of a data breach, you'll probably be told. But what if your password gets pwned some other way?
Read moreThe move follows last week's disclosure of an ongoing attack designed to mimic emails from the US Agency for International Development.
Read moreNew Barebones Ransomware Strain Surfaces
June 1 2021The authors of Epsilon Red have offloaded many tasks that are usually integrated into the ransomware -- such as Volume Shadow Copy deletion -- to PowerShell scripts.
Read moreMeat Producer JBS USA Hit By Ransomware Attack
June 1 2021The company says recovery from the attack may delay transactions with customers and suppliers.
Read moreAs we reimagine the post-pandemic workplace, we must also reevaluate post-pandemic email security practices.
Read moreName That Edge Toon: In Tow
June 1 2021Feeling creative? Submit your caption in the comments, and our panel of experts will reward the winner with a $25 Amazon gift card.
Read more
Recent Comments