Microsoft Says State-Sponsored Attackers Accessed Senior Leaders' Emails

Microsoft Says State-Sponsored Attackers Accessed Senior Leaders' Emails

Microsoft disclosed on Jan. 19 that a nation-state backed attack occurred beginning in November 2023 in which the Russian state-sponsored threat actor group Midnight Blizzard accessed some Microsoft corporate emails and documents through compromised email accounts. The attackers gained access in November 2023 using a legacy test tenant account. From there, they could use that account’s permissions to access a small number of Microsoft corporate email accounts – some of those accounts were for senior…

Read More

Report: 15% of law firms feel they have security gaps

Report: 15% of law firms feel they have security gaps

Report: 15% of law firms feel they have security gaps | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. …

Read More

Why nonprofits need to be more worried about cybersecurity

Why nonprofits need to be more worried about cybersecurity

Why nonprofits need to be more worried about cybersecurity | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This…

Read More

5 minutes with Bob Burke – The importance of advanced MFA technology

5 minutes with Bob Burke – The importance of advanced MFA technology

5 minutes with Bob Burke – The importance of advanced MFA technology | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn…

Read More

Cybercriminals target marketing, C-suite and IT

Cybercriminals target marketing, C-suite and IT

Cybercriminals target marketing, C-suite and IT | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses CookiesBy…

Read More

Increasing Adoption of Phishing Kits Puts MFA at Risk

Increasing Adoption of Phishing Kits Puts MFA at Risk

Anti-Phishing, DMARC , Fraud Management & Cybercrime , Incident & Breach Response Kit Enables ‘Man in the Middle’ Browser Session; MFA Makes Attackers Work Harder Prajeet Nair (@prajeetspeaks) • February 5, 2022     Because of increased use of multifactor authentication, attackers are developing phishing kits that steal tokens and bypass this trusted layer of security. See Also: Live Webinar | How to Stop the Four Horsemen of the Data Loss Apocalypse “Threat actors…

Read More

Zero Trust, a core component of any modern security strategy

Zero Trust, a core component of any modern security strategy

Zero Trust, a core component of any modern security strategy | 2021-06-10 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn…

Read More