Email:

Phone No.

Whatsapp

Month: July 2022

Microsoft SQL Servers Hacked to Steal Bandwidth for Proxy Services
Microsoft SQL Servers Hacked to Steal Bandwidth for Proxy Services
Microsoft SQL Servers Hacked to Steal Bandwidth for Proxy Services
Microsoft SQL Servers Hacked to Steal Bandwidth for Proxy Services

Microsoft SQL Servers Hacked to Steal Bandwidth for Proxy Services

Microsoft SQL Servers Hacked to Steal Bandwidth for Proxy Services Threat actors are generating revenue by using adware bundles, malware, or even hacking into Microsoft SQL servers, to convert devices into proxies that are rented through online proxy services. To steal a device’s bandwidth, the threat actors install software called ‘proxyware’ that allocates a device’s

As Microsoft Blocks Office Macros, Hackers Find New Attack Vectors

As Microsoft Blocks Office Macros, Hackers Find New Attack Vectors Hackers who normally distributed malware via phishing attachments with malicious macros gradually changed tactics after Microsoft Office began blocking them by default, switching to new file types such as ISO, RAR, and Windows Shortcut (LNK) attachments. VBA and XL4 Macros are small programs created to

Microsoft Edge Now Improves Performance by Compressing Disk Cache

Microsoft Edge Now Improves Performance by Compressing Disk Cache Microsoft says Microsoft Edge users will notice improved performance and a smaller disk footprint because the web browser now automatically compresses disk caches. “Beginning with Microsoft Edge 102 on Windows, Microsoft Edge automatically compresses disk caches on devices that meet eligibility checks, to ensure the compression

Microsoft: IIS Extensions Increasingly Used as Exchange Backdoors

Microsoft: IIS Extensions Increasingly Used as Exchange Backdoors Microsoft says attackers increasingly use malicious Internet Information Services (IIS) web server extensions to backdoor unpatched Exchange servers as they have lower detection rates compared to web shells. Because they’re hidden deep inside the compromised servers and often very hard to detect being installed in the exact

KEEP IN TOUCH

Subscribe to our mailing list to get free tips on Data Protection and Cybersecurity updates weekly!

PDPA-1024x683-min

KEEP IN TOUCH

Subscribe to our mailing list to get free tips on Data Protection and Cybersecurity updates weekly!

PDPA-1024x683-min

REPORTING DATA BREACH TO PDPC?

We have assisted numerous companies to prepare proper and accurate reports to PDPC to minimise financial penalties.
× Chat with us