KEEP IN TOUCH
Subscribe to our mailing list to get free tips on Data Protection and Cybersecurity updates weekly!
Researchers Use ‘Fingerprints’ To Track Windows Exploit Developers Researchers can now find the developer of a specific Windows exploit using a new “fingerprinting” technique specifically devised to keep track of exploit developers’ activity. More to the point, Check Point security researchers Itay Cohen and Eyal Itkin were able to track 16 Windows Kernel Local Privilege
XDSpy Cyber-Espionage Group Operated Discretely For Nine Years Researchers at ESET today published details about a threat actor that has been operating for at least nine years, yet their activity attracted almost no public attention. Going largely unnoticed for this long is a rare occurrence these days as malicious campaigns from long-standing adversaries overlap at
Microsoft Explains The Cause Of The Recent Office 365 Outage A preliminary report by Microsoft states that a bug in the deployment of an Azure AD service update caused Monday’s Office 365 outage. Starting at 5:20 PM EST on September 28th, people worldwide were unable to login to Office 365 and other related services, including Microsoft
Ransomware Gangs Add DDoS Attacks To Their Extortion Arsenal A ransomware operation has started to utilize a new tactic to extort their victims: DDoS a victim’s website until they return to the negotiation table. A distributed denial of service (DDoS) attack is when a threat actor floods a website or a network connection with a