Token-Mining Weakness in Microsoft Teams Makes for Perfect Phish
Access tokens for other Teams users can be recovered, allowing attackers to move from a single compromise to the ability…
Access tokens for other Teams users can be recovered, allowing attackers to move from a single compromise to the ability…
Albania blamed the Iranian government Saturday for a cyberattack against computer systems used by Albanian state police — just days…
A sweeping effort to prevent a raft of targeted cybercrime groups from posting ransomware victims' data publicly is hampering their…
Here are some strategies for protecting the business against botnets poised to take advantage of remote-work vulnerabilities.
By Capt. Rahul Khanna, Global Head of Marine Risk Consulting at Allianz Global Corporate & Specialty (AGCS) Commercial […] The…
Damart, a French clothing company with over 130 stores across the world, is being extorted for $2 million after a cyberattack from…
The proposed AMTSO guidelines offer a roadmap for comprehensive testing of IoT security products.
Microsoft warned customers today that it will finally disable basic authentication in random tenants worldwide to improve Exchange Online security…
Microsoft Azure customers' virtual machines (VMs) running Ubuntu 18.04 have been taken offline by an ongoing outage caused by a faulty…
Members of the government in Montenegro are stating that the country is being hit with sophisticated and persistent cyberattacks that…