Office 365’s Vast Attack Surface & All the Ways You Don’t Know You’re Being Exploited Through It

Mandiant incident response managers Josh Madeley and Doug Bienstock describe how thoroughly Microsoft 365 (formerly known as Office 365) extends into corporate networks, describe both sophisticated and simple attacks they’ve detected, and suggest mitigations as businesses rely more heavily on the cloud. from Dark Reading: https://ift.tt/3gzUa4p via IFTTT

Read More Office 365’s Vast Attack Surface & All the Ways You Don’t Know You’re Being Exploited Through It

OpenText Blends Security, Data Protection for Greater Cyber Resilience

SPONSORED CONTENT: Infosec professionals are taking advantage of technology hybrids to keep users, data, and their networks more safe, according to Hal Lonas of OpenText’s Webroot division. And they’re also finding new ways to use artificial intelligence and machine learning to improve security management and reduce risk. from Dark Reading: https://ift.tt/3kj77Sp via IFTTT

Read More OpenText Blends Security, Data Protection for Greater Cyber Resilience

Hacked Data Broker Accounts Fueled Phony COVID Loans, Unemployment Claims

A group of thieves thought to be responsible for collecting millions in fraudulent small business loans and unemployment insurance benefits from COVID-19 economic relief efforts gathered personal data on people and businesses they were impersonating by leveraging several compromised accounts at a little-known U.S. consumer data broker, KrebsOnSecurity has learned. In June, KrebsOnSecurity was contacted […]

Read More Hacked Data Broker Accounts Fueled Phony COVID Loans, Unemployment Claims

Broadcom: Staying Safe with WastedLocker Ransomware Variant on the Prowl

SPONSORED CONTENT: Stealthier and more patient than some predecessors, WastedLocker lingers surreptitiously for as long as it needs to for maximum payoff, says Jon DiMaggio with Broadcom’s Symantec division. He explains how Windows servers are at a different risk level than their open-source counterparts, and how WastedLocker identifies “valuable” targets. from Dark Reading: https://ift.tt/3fGROzK via […]

Read More Broadcom: Staying Safe with WastedLocker Ransomware Variant on the Prowl