Email:

Phone No.

Whatsapp

Blog

Office 365 Phishing Campaign Detects Sandboxes To Evade Detection
Office 365 Phishing Campaign Detects Sandboxes To Evade Detection
Office 365 Phishing Campaign Detects Sandboxes To Evade Detection
Office 365 Phishing Campaign Detects Sandboxes To Evade Detection

Office 365 Phishing Campaign Detects Sandboxes To Evade Detection

Office 365 Phishing Campaign Detects Sandboxes To Evade Detection Microsoft is tracking an ongoing Office 365 phishing campaign that makes use of several methods to evade automated analysis in attacks against enterprise targets. “We’re tracking an active credential phishing attack targeting enterprises that uses multiple sophisticated methods for defense evasion and social engineering,” Microsoft said.

Firefox 83 Boosts Security With HTTPS-Only Mode, Zero-Day Fix

Firefox 83 Boosts Security With HTTPS-Only Mode, Zero-Day Fix Mozilla Firefox 83 was released today with a new feature called ‘HTTPS-Only Mode’ that secures your browsing sessions by rewriting URLs to secure HTTPS versions. Windows, Mac, and Linux desktop users can upgrade to Firefox 83 by going to Options -> Help -> About Firefox. The browser will automatically check for

Coil Payments Platform Leaks User Emails In ‘Privacy Policy’ Update

Coil Payments Platform Leaks User Emails In ‘Privacy Policy’ Update Coil has accidentally exposed some of its users’ email addresses in a mass email announcement sent out today. Coil is a micropayments platform, similar to Patreon (but not quite) that is used by writers and popular blogging sites to monetize content. Ironically, the mishap happened within an email

Microsoft Brings Its On-die Pluton Security Processor To Intel, AMD CPUs

Microsoft Brings Its On-die Pluton Security Processor To Intel, AMD CPUs Microsoft is integrating its Pluton security processor directly into Intel, AMD, and Qualcomm CPUs to better secure Windows PCs. Windows 10 gains enhanced security by utilizing specialized chips called Trusted Platform Modules (TPMs) to provide hardware-based security functions. These functions include generating cryptographic keys, protecting authentication credentials

KEEP IN TOUCH

Subscribe to our mailing list to get free tips on Data Protection and Cybersecurity updates weekly!

PDPA-1024x683-min

KEEP IN TOUCH

Subscribe to our mailing list to get free tips on Data Protection and Cybersecurity updates weekly!

PDPA-1024x683-min

REPORTING DATA BREACH TO PDPC?

We have assisted numerous companies to prepare proper and accurate reports to PDPC to minimise financial penalties.
× Chat with us