Widespread, Brute-Force, Cloud-to-Cloud Attacks Hit Office 365 Users

An operationalized cloud-to-cloud brute-force attack against Microsoft Office 365 users has hit high-level employees at multiple Fortune 2,000 organizations. According to Skyhigh Networks, which remediated the attack, the perpetrators used popular cloud service platforms to conduct a persistent attack to log into corporate Office 365 accounts. The campaign had a “slow-and-low” pattern of coordinated attacks on high-value targets, including more than 100,000 failed Office 365 […]

What Is the Difference Between Malware & Spyware?

Malware is a blanket term that is used to describe a number of malicious types of software, including adware, spyware, viruses, trojans and more. Spyware is a specific type of malware, but is quite different from most other malicious software because of what it is designed to do. Purpose Most malware is designed to cause harm to your computer in some way. Many programs can […]

The Week in Ransomware – November 4th 2016 – Cerber, PayDOS, Alcatraz Locker, and More!

The Week in Ransomware – November 4th 2016 – Cerber, PayDOS, Alcatraz Locker, and More! By Lawrence Abrams November 4, 2016 05:48 PM 2 Wow..lots of annoying little ransomware variants. Many of which will probably never make it too far into distribution. The biggest news is the release of new Cerber versions that now helpfully tell us the version number in the ransom note. Also […]

About the Office 365 admin center – Office 365

The Office 365 admin center is used to set up your organization in the cloud, manage users, manage subscriptions, and much more. In this article, learn how to get to the Office 365 admin center and learn about available features and settings. Check out the Office 365 admin center There are a few ways you can check out the new Office 365 admin center. You […]

Make your emails more trusted with DKIM | Computerworld

The war against spam has been a long one. Just as we get better filtering, spammers and phishers turn to more sophisticated techniques. We are even seeing ransomware attacks like Cryptolocker and Cryptowall become commonly spread over email. There must be a technical way to stop some of this, right? There is an Internet authentication system — DomainKeys, and its successor, DKIM — that tries […]