Microsoft: Slow MFA adoption presents “dangerous mismatch” in security

Credit to Author: Malwarebytes Labs| Date: Wed, 09 Feb 2022 11:55:24 +0000

Microsoft says its corporate users are not using MFA, another layer of security that keeps accounts safe. Unfortunately, this is not an isolated problem.

Categories: Security world

Tags:

(Read more…)

The post Microsoft: Slow MFA adoption presents “dangerous mismatch” in security appeared first on Malwarebytes Labs.

Read more

Evolved phishing: Device registration trick adds to phishers’ toolbox for victims without MFA

Credit to Author: Microsoft 365 Defender Threat Intelligence Team| Date: Wed, 26 Jan 2022 17:00:00 +0000

We uncovered a large-scale, multi-phase campaign that adds a novel technique to traditional phishing tactics by joining an attacker-operated device to an organization’s network to further propagate the campaign.

The post Evolved phishing: Device registration trick adds to phishers’ toolbox for victims without MFA appeared first on Microsoft Security Blog.

Read more

Explained: the strengths and weaknesses of the Zero Trust model

Credit to Author: Pieter Arntz| Date: Tue, 28 Jan 2020 16:00:00 +0000

Zero Trust is an information security framework that insists its users “never trust, always verify.” Is this the best security model for organizations today? We examine its strengths and weaknesses.

Categories:

Tags:

(Read more…)

The post Explained: the strengths and weaknesses of the Zero Trust model appeared first on Malwarebytes Labs.

Read more

How to implement Multi-Factor Authentication (MFA)

Credit to Author: Elizabeth Wolk| Date: Wed, 15 Jan 2020 17:00:21 +0000

The goal of MFA implementation is to enable it for all your users, on all of your systems, all of the time. Learn how to successfully roll out and support MFA in your organization.

The post How to implement Multi-Factor Authentication (MFA) appeared first on Microsoft Security.

Read more

Threat spotlight: Phobos ransomware lives up to its name

Credit to Author: Jovi Umawing| Date: Fri, 10 Jan 2020 18:04:44 +0000

Phobos, which many believe was named after the Greek god of fear, isn’t as widespread as it was before nor is it more novel than your average ransomware. Yet, it remains a threat to consumers and businesses alike. We dive into Phobos ransomware and show users how to face their fears and protect against it.

Categories:

Tags:

(Read more…)

The post Threat spotlight: Phobos ransomware lives up to its name appeared first on Malwarebytes Labs.

Read more

When can we get rid of passwords for good?

Credit to Author: Pieter Arntz| Date: Wed, 16 Oct 2019 20:17:19 +0000

Passwords are a burden and security risk, especially when used as a single authentication method. Can we get rid of passwords once and for all? We list alternative authentication methods and discuss their pros and cons.

Categories:

Tags:

(Read more…)

The post When can we get rid of passwords for good? appeared first on Malwarebytes Labs.

Read more

Business email compromise scam costs Pathé $21.5 million

Credit to Author: Christopher Boyd| Date: Mon, 19 Nov 2018 16:00:23 +0000

Recently released court documents show European-based cinema chain Pathé lost a small fortune to a business email compromise (BEC) scam in March 2018. The attack cost the company $21.5 million—that’s 10 percent of its total earnings. Learn how to avoid BEC scams and keep your company in the black.

Categories:

Tags:

(Read more…)

The post Business email compromise scam costs Pathé $21.5 million appeared first on Malwarebytes Labs.

Read more