cybersecurity

MicrosoftSecurity

Evolved phishing: Device registration trick adds to phishers’ toolbox for victims without MFA

Credit to Author: Microsoft 365 Defender Threat Intelligence Team| Date: Wed, 26 Jan 2022 17:00:00 +0000

We uncovered a large-scale, multi-phase campaign that adds a novel technique to traditional phishing tactics by joining an attacker-operated device to an organization’s network to further propagate the campaign.

The post Evolved phishing: Device registration trick adds to phishers’ toolbox for victims without MFA appeared first on Microsoft Security Blog.

Read More
MicrosoftSecurity

Celebrating 20 Years of Trustworthy Computing

Credit to Author: Lauren Goodwin| Date: Fri, 21 Jan 2022 17:00:00 +0000

20 years ago this week, Bill Gates sent a now-famous email to all Microsoft employees announcing the creation of the Trustworthy Computing (TwC) initiative. The initiative was intended to put customer security, and ultimately customer trust, at the forefront for all Microsoft employees.

The post Celebrating 20 Years of Trustworthy Computing appeared first on Microsoft Security Blog.

Read More
QuickHealSecurity

CVE-2021-44228: New Apache Log4j ‘Log4Shell’ Zero-Day Being Exploited in the Wild

Credit to Author: Quickheal| Date: Wed, 15 Dec 2021 10:34:59 +0000

A critical zero-day vulnerability (CVE-2021-44228) recently discovered Apache Log4J, the popular java open source logging library used in…

The post CVE-2021-44228: New Apache Log4j ‘Log4Shell’ Zero-Day Being Exploited in the Wild appeared first on Quick Heal Blog | Latest computer security news, tips, and advice.

Read More