Internet infrastructure company Cloudflare said it recently blocked the largest recorded volumetric distributed denial-of-service (DDoS) attack, which peaked at 11.5 terabits per second (Tbps). […] Go to Source Author: Sergiu Gatlan
Category Archives: Security
Jaguar Land Rover (JLR) announced that a cyberattack forced the company to shut down certain systems as part of the mitigation effort. […] Go to Source Author: Bill Toulas
The Office of the Pennsylvania Attorney General announced that a ransomware attack is behind the ongoing two-week service outage. […] Go to Source Author: Bill Toulas
Palo Alto Networks suffered a data breach that exposed customer data and support cases after attackers abused compromised OAuth tokens from the Salesloft Drift breach to access its Salesforce instance. […] Go to Source Author: Lawrence Abrams
Cybersecurity company Zscaler warns it suffered a data breach after threat actors gained access to its Salesforce instance and stole customer information, including the contents of support cases. […] Go to Source Author: Lawrence Abrams
Researchers have disrupted an operation attributed to Russian state-sponsored threat group Midnight Blizzard, who sought access to Microsoft 365 accounts and data. […] Go to Source Author: Bill Toulas
Hackers have found a way to send phishing emails using regular office devices such as printers, bypassing security checks. Read this article to learn how this scheme works and the steps you can take to prevent an attack. How do hackers use office devices to send fake phishing emails? Microsoft 365’s Direct Send feature was […]
A new security flaw in Microsoft 365 enables hackers to exploit office devices and send fake emails that appear to be from within an organization. Let’s look at how this scam works and what you can do to keep your data protected. How do hackers use office devices to send fake phishing emails? Microsoft 365’s […]
Cybercriminals are now using innocuous office devices such as printers and scanners to launch phishing attacks without needing to hack into your email account. Learn how to spot and stop this new trick to keep your workplace safe from phishing scams. How do hackers use office devices to send fake phishing emails? Microsoft 365’s Direct […]
Cybercriminals are abusing Meta’s advertising platforms with fake offers of a free TradingView Premium app that spreads the Brokewell malware for Android. […] Go to Source Author: Ionut Ilascu



