The perpetrators behind the SolarWinds supplychain attack were observed leveraging four separate, techniques to bypass identity and access management protections and laterally move from victims’ on-premises networks to their cloud-based Microsoft 365 accounts. Companies that use M365 may therefore wish to heed three key recommendations: harden your hybrid environments, conduct thorough audits of your cloud […]
Category Archives: News
Microsoft says that the end goal of the SolarWinds supply chain compromise was to pivot to the victims’ cloud assets after deploying the Sunburst/Solorigate backdoor on their local networks. No new tactics, techniques, and procedures (TTPs) were shared in a blog post published on Monday to provide Microsoft 365 Defender users with threat hunting techniques […]
An agency can run a completely compliant network and still be breached by a trusted user’s account being exposed. The U.S. government is one of the largest cyber targets in the world. With a broadening array of endpoints globally, agency networks are increasingly vulnerable to malware, spyware and ransomware, and there have been a number […]
Pairing these tips with your common sense means increased security for your devices Our phones have become an extension of our bodies, storing everything from our most personal memories to our banking information to which restaurants we love. They’re essential, personal— and highly steal-able. They’re also at risk of cyberattacks, which means that even if […]
Google has been hit by a massive global outage that stopped users from accessing virtually every Google service, including Gmail, YouTube, and Google Docs. Users reported an inability to sign in to Gmail; watch videos; access essential documents, and execute simple tasks on the platform. The problems started occurring in early Monday morning, and Google […]