1,123 Results for:HTTPS

  • Sort by: 

Microsoft appears to reverse VBA macro-blocking

By Alex Scroxton 08 Jul 2022

Microsoft quietly reverses VBA macro-blocking across its Office portfolio in a move that has left security experts puzzled Read More

Use backup encryption to protect data from would-be thieves

By David Weldon 30 Mar 2023

Encryption is a powerful tool to keep sensitive data out of the wrong hands. To ensure recoverability after a disruption, data backup encryption is vital. Read More

Top 10 tips for employees to prevent phishing attacks

By Sharon Shea 23 Oct 2023

Share this list of phishing techniques, detection and prevention tips, and best practices to help employees avoid falling victim to phishing schemes. Read More

Get started with Azure AD entitlement management automation

By Liam Cleary 14 Apr 2022

Identity governance tasks in Azure Active Directory can be overwhelming, but understanding how to use Microsoft Graph and PowerShell to work with these settings will help. Read More

How has the UK response to ransomware worked?

By Philip Virgo 06 Jun 2022

Ransomware gangs begin with their own due diligence - to calculate how much the victim (or insurer) will pay before reporting. They are likely to move on and find a victim who will not report, ... Read More

Intel BootGuard private keys leaked following MSI hack

By Alexander Culafi 08 May 2023

Intel said it was "actively investigating" reports that OEM BootGuard keys were stolen and leaked by ransomware actors following a breach at motherboard maker MSI Read More

Quishing on the rise: How to prevent QR code phishing

By Alissa Irei 29 Jun 2023

A monthslong quishing campaign demonstrated how cybercriminals are using QR codes to trick users. Here's what enterprise security leaders need to know. Read More

How to deploy Office productivity apps on Chromebooks

By Gary Olsen 26 Jan 2024

Web app versions of the Microsoft Office productivity suite lack some features, so IT teams should learn how to deliver the full versions of the apps to systems such as ChromeOS. Read More

How to use Wfuzz to find web application vulnerabilities

By Alissa Irei, No Starch Press 23 May 2023

By learning how to use Wfuzz for web application fuzz testing, bug bounty hunters can automate vulnerability discovery. Learn more in this excerpt from 'Bug Bounty Bootcamp.' Read More

Source of 3CX supply chain attack unclear as fallout continues

By Alexander Culafi 03 Apr 2023

Multiple statements originally referenced a third-party library as the apparent source for 3CX's recent supply chain attack, but that may no longer be the case. Read More