Category: Vendor News

So, Your MFA is Phishable, What To Do Next

Most MFA is Easily Phishable Many people are shocked when we show them how easy it is to bypass or hack most MFA solutions. In the majority of cases, it’s as easy to do as phishing a password. Here’s a good example video demonstrating how easy it is to phish past most MFA solutions. Use […]

WWDC22 updates and what they mean for Apple device management

By Rishab It’s that time of the year; Apple has once again revealed an interesting set of updates at its Worldwide Developers Conference 2022, aka WWDC22. With new features as well as enhancements to existing ones, the aim this year is to elevate the end user’s experience and privacy while enriching device management and security […]

[Whoa] Ransomware Strains Almost Double in Six Months from 5,400 to 10,666

A recent report from FortiGuard Labs saw ransomware variants double in total so far compared to 2021, and the year is not over yet. In a statement from FortiGuard Lab’s Chief Strategist, “Cyber adversaries are advancing their playbooks to thwart defense and scale their criminal affiliate networks. They are using aggressive execution strategies such as […]

What’s Next for the 3.8 Billion Entries in the Clubhouse-Facebook Database? Plenty of Social Engineering Attacks

What do you get when you add a totally free 1.3 Billion set of phone numbers and data from millions of Facebook profiles? A massive dox database of users now up for sale for $100,000. The Clubhouse data breach earlier this year, while headline-worthy, resulted in a big nothing where all the phone numbers exfiltrated […]

Say hello to Windows 11 with Endpoint Central

By Manish Mandal Microsoft unveiled Windows 11 on June 24, 2021 at its virtual launch event. Though Windows 11 will be officially available on October 5, 2021, Microsoft has shared the initial beta version with members of its Windows Insider Program. Starting October 5th, Microsoft will roll out the Windows 11 upgrade to eligible Windows […]

Google Ads Abused to Deliver Malware

Cybercriminals are using malicious Google Ads to deliver the ZLoader banking Trojan, ZDNet reports. Researchers at Microsoft stated on Twitter that attackers are purchasing Google Ads that point to compromised websites, then redirect the user to a malicious website that delivers the malware. The criminals use the ads to target people who search Google for […]

A kernel of truth: Linux isn’t as foolproof as we may have thought

By Joyal Bennison A world without Linux is hard to imagine. Every Google search we run is accomplished on Linux-based servers. Behind the Kindle we enjoy reading, to the social media sites we spend scrolling away every day sits the Linux kernel. Would you believe your ears if I tell you the world’s top 500 […]

Five worthy reads: Differential privacy—what it means for businesses

Five worthy reads is a regular column on five noteworthy items we’ve discovered while researching trending and timeless topics. In this edition, we explore one of the evolving privacy-enhancing techniques called differential privacy and how it’s being leveraged by organizations to safeguard sensitive data from being exposed. By Abirami A Cutting-edge technologies based on artificial […]

Large Phishing Campaign Abuses Open Redirects

Researchers at Microsoft have observed a widespread phishing campaign that’s abusing open redirectors to fool users into visiting credential-harvesting pages. Open redirects are often used for legitimate purposes, such as tracking click rates. However, they can also be abused to disguise a link to a phishing page. “The use of open redirects in email communications […]

Securing endpoints, part 1: Ensuring hackers don’t manipulate your browsers to carry out attacks

By Bhuvaneswari Kg In a world of automation, computers and the data on them have become the backbone of many organizations. But data is a double-edged sword. It can be leveraged by organizations to improve operations, but in the wrong hands, it can be a deadly weapon for hackers. So how do organizations ensure their […]