Defender for Office 365 will allow users to report phishing messages
Microsoft announces an update for Microsoft Defender for Office 365 that allows Microsoft Teams users to alert their management and IT team of phishing, scamming and other dodgy messages.
Previously known as Office 365 ATP (Advanced Threat Protection), Microsoft Defender for Office 365 strives t... Read more
GIFShell attacks Microsoft Teams users with GIFs
GIFShell is attacking Microsoft Teams users by making them download malicious files on their system via GIFs.
A new malware attack has been surfacing over the past few weeks. GIFShell was created to intercept Microsoft Teams and execute phishing attacks using GIFs. Although many people enjoy a g... Read more
F5 Introduces NGINX Management Suite
F5 introduced version 1.0 of the NGINX Management Suite. The release gives companies greater visibility and control over their NGINX environments and related services. It allows users to more easily connect, scale and secure applications and APIs.
NGINX originated as an open-source solution for ... Read more
Hacking campaign uses infected James Webb Telescope image
Investigators discovered a new malware campaign that uses gigapixel images from the James Web Project to distribute malware on target computers.
The James Web Telescope (JWST) was launched after more than two decades of planning and development. It's a turning point for astronomy, but sadly also... Read more
French data regulator investigates Twitter’s “egregious” data security
The authority will investigate allegations made by Twitter’s former head of security.
France's data protection watchdog CNIL is investigating a whistleblower's claims that Twitter made "egregious" misrepresentations to international regulators about its data security measures, according to a r... Read more
NEC and Fortinet collaborate on secure 5G networks
NEC and Fortinet are bringing joint solutions to market to provide communication service providers (CSPs) with secure 5G networks.
The advent of 5G is causing a sharp increase in data traffic over networks. Operators are required to make significant architectural changes without compromising on ... Read more
VPNs on iOS devices allegedly leak network traffic
Research proves that VPNs running on Apple devices keep the connection insecure and open, leading to data exposure.
Earlier this week, a security researcher revealed that iOS devices do not fully secure the network traffic and connection through VPNs as one would expect.
According to a tech s... Read more
Sysdig integrates machine learning to detect cryptojacking attempts
Container security firm Sysdig introduced ML-powered cloud detection to help businesses deal with cryptojacking threats.
Sysdig announced its latest machine-learning-backed response capability and cloud detection that can aid companies in dealing with various cryptojacking threats and vulnerabil... Read more
Google improves Workspace security against account hijacking
Google added an extra security layer to Workspace. The new functionality monitors accounts at risk of being hijacking to prevent accounts from being hijacked.
Google introduced the update to prevent hackers from hijacking Workspace accounts that take risky actions. This should better protect th... Read more
Microsoft adds new security measures to Edge
The move aims to protect users on sites that may be malicious in nature.
Microsoft Edge is adding enhanced security protections to provide an extra layer of protection when browsing the web and visiting unfamiliar sites, according to a report in The Register. Microsoft wants to make it safer for... Read more