Cybercrime | News, how-tos, features, reviews, and videos
Your users are in the crosshairs of the best attackers out there. Follow these steps to better protect them.
Ransomware groups most often gain entry to Windows networks through malicious Office documents and then move laterally by abusing Windows privileges. Here's how to defend against both.
Admins in many businesses report indicators of compromise from an Exchange zero-day vulnerability. Don't assume you're not a target. Investigate for signs of the attack and patch now.
Attackers frequently send malicious JavaScript files through bogus emails. It's easy to block these files from reaching a hapless user. Here's how.
Active but unused subdomains in Microsoft Azure give attackers the opportunity to use them for malicious purposes. Here's how to identify and delete vulnerable subdomains before attackers do.
Even large companies like Honda can fall victim to a targeted ransomware attack. Take these steps to harden your Windows network against them.
Microsoft's new Office 365 security defaults and OAuth 2.0 support will help meet new US government recommendations to thwart COVID-related attacks, Make sure they are properly implemented.
You've set up your remote workers during this COVID-19 crisis, but have you made the adjustments to be prepared for a cyber disaster like a ransomware attack?
The rise in phishing attempts requires another look at your Microsoft Office settings to minimize the risk of a user executing a malicious script.
Attackers are more clever about how they hide malicious files. Countering that starts with knowing what services belong on your network.