US Government Issues Most Specific M365 Security Guidelines Yet
Read full article here.
Read full article here.
Sareen Habeshian of Axios reports on potential repercussions of the Crowdstrike outage. -Full Article
Ransomware is a bit like Covid. If it has not hit you yet, you do know someone it has. Sam Smith ...
There is a critical flaw in Apple devices (phones and tablets) that really needs to be addressed right away. This flaw ...
Danny Palmer of ZDNet reports on how cybersecurity insurance could be fueling the ransomware industry. -Article
Lily Hay Newman of Ars Technica reports on Dell SupportAssist vulnerabilities -Article
A technical discussion of how you can effectively “poison” your business by installing illegally “cracked” software, including defeating integrated malware protections and Windows Updates. Well worth reading if you’re so inclined! ...
Danny Palmer of ZDNet reports on use of stolen credentials. -Article
Kevin Beaumont of Double Pulsar reports on the looming threat of modern cyber-crime trends. -Article
Ivana Saric of Axios reports on Colonial Pipeline Ransomware developments. -Article