1,278 Results for:url
- Sort by:
Working with the Microsoft Defender for Identity portal
21 Sep 2021The security product, formerly Azure Advanced Threat Protection, taps into the cloud to uncover suspicious activity across the on-premises network. Read More
TA2451 targets aviation and transport sector with tailored lures
15 Feb 2022Newly designated cyber criminal group favours highly specific lures and a tried-and-tested modus operandi to compromise targets in the aviation, aerospace and transport sectors Read More
Unit 42 finds polyglot files delivering IcedID malware
29 Sep 2022Palo Alto Networks' Unit 42 says attackers are using decoy Microsoft Compiled HTML Help files containing multiple file formats to infect systems with information-stealing malware. Read More
How to create a cybersecurity awareness training program
27 Oct 2023Cybersecurity awareness training often misses the mark, leaving employees undereducated and organizations vulnerable to attack. Here's how to succeed where too many fail. Read More
A guide to enrolling Apple devices in Jamf
23 Feb 2022Organizations should consider management platforms from specialized vendors, such as Jamf, for specific OSes including Apple iOS. Learn how to enroll Apple devices into Jamf here. Read More
NCSC exposes Iranian, Russian spear-phishing campaign targeting UK
25 Jan 2023Spear-phishing campaigns likely linked to Iranian and Russian espionage activity are targeting persons of interest in the UK, warns the NCSC Read More
How to setup an Nginx reverse proxy server example
28 May 2022Here's a quick tutorial to setup an Nginx reverse proxy server. This example uses an Apache Tomcat server but the config settings apply for other backend app servers such as Node, Express, ... Read More
How to create a GitHub repository
30 Mar 2021This GitHub repository tutorial shows users how to create a new repository in the popular, cloud-hosted Git offering. Let’s dig into the central concepts of GitHub-based DevOps. Read More
Play ransomware actors bypass ProxyNotShell mitigations
21 Dec 2022CrowdStrike is urging organizations to apply the latest Microsoft Exchange updates after investigations revealed attackers developed a bypass for ProxyNotShell mitigations. Read More
Set up a machine learning pipeline in this Kubeflow tutorial
19 Apr 2023For teams running machine learning workflows with Kubernetes, using Kubeflow can lead to faster, smoother deployments. Get started with this installation guide. Read More