Blog

4G, 5G networks could be vulnerable to exploit due to ‘mishmash’ of old technologies

Written by Charlie Osborne for Zero Day Media – October 2nd, 2020 The decades old SS7 signaling system is one of numerous protocols exposing 5G networks to abuse. The next-generation wireless technology is expected to account for 21% of all wireless infrastructure investments over 2020. Pilots and official rollouts are underway worldwide -- despite the disruption caused ...

Read More

Two Russians Charged in $17M Cryptocurrency Phishing Spree

krebsonsecurity.com – September 20th, 2020 U.S. authorities today announced criminal charges and financial sanctions against two Russian men accused of stealing nearly $17 million worth of virtual currencies in a series of phishing attacks throughout 2017 and 2018 that spoofed websites for some of the most popular cryptocurrency exchanges. The Justice Department unsealed indictments against Russian nationals ...

Read More

The Different Ways To Prepare For A Cybersecurity Certification

Let’s face it, in the world of technology, there are literally a ton of certifications that are out there, especially in Cybersecurity. Not only is it confusing deciding which one to get, it can get even more difficult trying to figure out the best way to pass the exam on the first attempt. In this ...

Read More

Plan your career, analyst urges CISOs

Written by Howard Soloman for IT World Canada – September 24th, 2020 A lot of chief information security officers tell Forrester Research they didn’t plan on becoming CISOs after years of working in infosec jobs. It just happened, or they were “voluntold” for the post because no one else wanted it. That, says the Forrester principal analyst ...

Read More

How To Share your Outlook Calendar

For any business, no matter how large or small they might be, or even the industry that they serve, there is one common need; that is,  the need to schedule out tasks, events, deadlines, and project milestones.  There have been a few approaches to this, including using a whiteboard.  But given the realities of the ...

Read More

Firefox bug lets you hijack nearby mobile browsers via WiFi

By Catalin Cimpanu for Zero Day | September 18, 2020 Mozilla says users should update as soon as possible to Firefox v79 for Android. Mozilla has fixed a bug that can be abused to hijack all the Firefox for Android browsers on the same WiFi network and force users to access malicious sites, such as phishing pages. ...

Read More

Restricting Guest User Access in Azure Active Directory

Written by Tony Redmond – September 17th, 2020 Clamping Down on Guests After several years’ usage, most Office 365 tenants are accustomed to guest users and the way that the Microsoft 365 groups membership model allows guests access to group resources such as plans, sites, and teams. For most, the model works well, and the only issue ...

Read More

Spear-Phishers Leverage Office 365 Ecosystem to Validate Stolen Creds in Real Time

Written by Ericka Chickowski – September 11th, 2020 New attack technique uses Office 365 APIs to cross-check credentials against Azure Active Directory as victim types them in. Serving as yet another proof point of the creativity with which attackers are targeting Office 365 users with new phishing schemes, Armorblox researchers yesterday detailed a new attack technique they ...

Read More

The Newest Features Of Microsoft Teams (September 2020)

img.wp-post-image { display: inline;} With the Remote Workforce now becoming a reality for the longer term, the need to communicate with colleagues and co-workers in a virtual environment is an absolute must. There are tools out there that can be used, such as Skype, Zoom, WebEx, etc., but none of them have the ...

Read More

Microsoft Security: What cybersecurity skills do I need to become a CISO?

Written by Abbas Kudrati – Chief Security Advisor, Microsoft Build the business skills you need to advance to Chief Information Security Officer. For many cybersecurity professionals, the ultimate career goal is to land a chief information security officer (CISO) job. A CISO is an executive-level position responsible for cyber risk management and operations. But cybersecurity is transforming. ...

Read More