1,123 Results for:HTTPS
- Sort by:
Microsoft appears to reverse VBA macro-blocking
08 Jul 2022Microsoft quietly reverses VBA macro-blocking across its Office portfolio in a move that has left security experts puzzled Read More
Use backup encryption to protect data from would-be thieves
30 Mar 2023Encryption is a powerful tool to keep sensitive data out of the wrong hands. To ensure recoverability after a disruption, data backup encryption is vital. Read More
Top 10 tips for employees to prevent phishing attacks
23 Oct 2023Share this list of phishing techniques, detection and prevention tips, and best practices to help employees avoid falling victim to phishing schemes. Read More
Get started with Azure AD entitlement management automation
14 Apr 2022Identity governance tasks in Azure Active Directory can be overwhelming, but understanding how to use Microsoft Graph and PowerShell to work with these settings will help. Read More
How has the UK response to ransomware worked?
06 Jun 2022Ransomware gangs begin with their own due diligence - to calculate how much the victim (or insurer) will pay before reporting. They are likely to move on and find a victim who will not report, ... Read More
Intel BootGuard private keys leaked following MSI hack
08 May 2023Intel said it was "actively investigating" reports that OEM BootGuard keys were stolen and leaked by ransomware actors following a breach at motherboard maker MSI Read More
Quishing on the rise: How to prevent QR code phishing
29 Jun 2023A monthslong quishing campaign demonstrated how cybercriminals are using QR codes to trick users. Here's what enterprise security leaders need to know. Read More
How to deploy Office productivity apps on Chromebooks
26 Jan 2024Web app versions of the Microsoft Office productivity suite lack some features, so IT teams should learn how to deliver the full versions of the apps to systems such as ChromeOS. Read More
How to use Wfuzz to find web application vulnerabilities
23 May 2023By learning how to use Wfuzz for web application fuzz testing, bug bounty hunters can automate vulnerability discovery. Learn more in this excerpt from 'Bug Bounty Bootcamp.' Read More
Source of 3CX supply chain attack unclear as fallout continues
03 Apr 2023Multiple statements originally referenced a third-party library as the apparent source for 3CX's recent supply chain attack, but that may no longer be the case. Read More