How a business email compromise attack exploited Microsoft’s multi-factor authentication

Mitiga says that MFA, even if improperly configured, is no panacea for preventing attackers from abusing compromised credentials.
The post How a business email compromise attack exploited Microsoft’s multi-factor authentication appeared first on TechRe… Continue reading How a business email compromise attack exploited Microsoft’s multi-factor authentication

How a business email compromise scam spoofed the CFO of a major corporation

In a scam analyzed by Avanan, the victim received an email claiming to be from the CFO directing them to make a payment to their insurance company.
The post How a business email compromise scam spoofed the CFO of a major corporation appeared first on T… Continue reading How a business email compromise scam spoofed the CFO of a major corporation

How ransomware attacks target specific industries

Analyzing over 100 prominent ransomware incidents, Barracuda found the top targeted sectors to be education, municipalities, healthcare, infrastructure and financial.
The post How ransomware attacks target specific industries appeared first on TechRepu… Continue reading How ransomware attacks target specific industries

Apple users urged to install latest updates to combat hacking

The new updates patch security flaws in iOS/iPadOS, macOS and Safari that could be exploited by hackers to gain remote control of an affected device.
The post Apple users urged to install latest updates to combat hacking appeared first on TechRepublic.
Continue reading Apple users urged to install latest updates to combat hacking

How to protect your industrial facilities from USB-based malware

USB-borne malware can infect your industrial equipment unless you take the proper precautions, says Honeywell.
The post How to protect your industrial facilities from USB-based malware appeared first on TechRepublic.
Continue reading How to protect your industrial facilities from USB-based malware