Interlock ransomware attacks highlight need for greater security standards on critical infrastructure

Standing privilege can be minimized using the zero trust principleCritical servers can be protected by enabling just-in-time accessFreeBSD jails can help to isolate workloads and enhance defense A recently discovered…

Continue Reading Interlock ransomware attacks highlight need for greater security standards on critical infrastructure

This devious two-step phishing campaign uses Microsoft tools to bypass email security

Two-step phishing evades security with user-triggered actionsFake Microsoft portals harvest sensitive login credentials fastAdvanced threat detection is key to fighting phishing A two-step phishing attack is leveraging Microsoft Visio files…

Continue Reading This devious two-step phishing campaign uses Microsoft tools to bypass email security