Email:

Phone No.

Whatsapp

Blog

Mimecast Discloses Microsoft 365 SSL Certificate Compromise
Mimecast Discloses Microsoft 365 SSL Certificate Compromise
Mimecast Discloses Microsoft 365 SSL Certificate Compromise
Mimecast Discloses Microsoft 365 SSL Certificate Compromise

Mimecast Discloses Microsoft 365 SSL Certificate Compromise

Mimecast Discloses Microsoft 365 SSL Certificate Compromise Email security company Mimecast has disclosed today that a “sophisticated threat actor” compromised one of the certificates the company issues for customers to securely connect Microsoft 365 Exchange to their services. Mimecast discovered that the certificate was compromised after recently receiving a notification from Microsoft. “Microsoft recently informed

New Sunspot Malware Found While Investigating SolarWinds Hack

New Sunspot Malware Found While Investigating SolarWinds Hack Cybersecurity firm CrowdStrike has discovered the malware used by the SolarWinds hackers to inject backdoors in Orion platform builds during the supply-chain attack that led to the compromise of several companies and government agencies. Sunspot, as it was dubbed by CrowdStrike, was dropped by the attackers in the

Intel Adds Hardware-based Ransomware Detection To 11th Gen CPUs

Intel Adds Hardware-based Ransomware Detection To 11th Gen CPUs Intel announced today at CES 2021 that they have added hardware-based ransomware detection to their newly announced 11th generation Core vPro business-class processors. These hardware-based detections are accomplished using Intel Threat Detection Technology (Intel TDT) and Hardware Shield that run directly on the CPU underneath the

Microsoft Sysmon Now Detects Malware Process Tampering Attempts

Microsoft Sysmon Now Detects Malware Process Tampering Attempts Microsoft has released Sysmon 13 with a new security feature that detects if a process has been tampered using process hollowing or process herpaderping techniques. To evade detection by security software, threat actors inject malicious code into a legitimate Windows process. This tactic allows the malware to

KEEP IN TOUCH

Subscribe to our mailing list to get free tips on Data Protection and Cybersecurity updates weekly!

PDPA-1024x683-min

KEEP IN TOUCH

Subscribe to our mailing list to get free tips on Data Protection and Cybersecurity updates weekly!

PDPA-1024x683-min

REPORTING DATA BREACH TO PDPC?

We have assisted numerous companies to prepare proper and accurate reports to PDPC to minimise financial penalties.
× Chat with us