Midnight Blizzard Escalates Spear-Phishing Attacks

Midnight Blizzard Escalates Spear-Phishing Attacks

Microsoft Threat Intelligence has uncovered a new attack campaign by Russian threat actor Midnight Blizzard, targeting thousands of users across over 100 organizations. The attack leverages spear-phishing emails with RDP configuration files, allowing attackers to connect to and potentially compromise the targeted systems. The attack campaign targeted thousands of users in higher education, defense, non-governmental organizations, and government agencies. Dozens of countries have been impacted, particularly in the U.K., Europe, Australia, and Japan, which is…

Read More

5 ways businesses can navigate the evolving minefield of data privacy

5 ways businesses can navigate the evolving minefield of data privacy

5 ways businesses can navigate the evolving minefield of data privacy | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more….

Read More

5 ways businesses can navigate the evolving minefield of data privacy

5 ways businesses can navigate the evolving minefield of data privacy

5 ways businesses can navigate the evolving minefield of data privacy | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more….

Read More

How to cut the line on increasingly phishy hackers this tax season

How to cut the line on increasingly phishy hackers this tax season

How to cut the line on increasingly phishy hackers this tax season | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn…

Read More

Managing the cybersecurity risks of ungoverned accounts

Managing the cybersecurity risks of ungoverned accounts

Managing the cybersecurity risks of ungoverned accounts | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses…

Read More

Human error, psychology and specificity: The power of spear phishing

Human error, psychology and specificity: The power of spear phishing

Human error, psychology and specificity: The power of spear phishing This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses…

Read More

New spear phishing emails target C-suite executives, assistants & financial departments

New spear phishing emails target C-suite executives, assistants & financial departments

New spear phishing emails target C-suite executives, assistants & financial departments | 2021-03-19 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to…

Read More