Microsoft Disrupts Large-Scale BEC Campaign Across Web Services Attackers had used the cloud-based infrastructure to target mailboxes and add forwarding rules to learn about financial transactions.
What Industrial Control System Vulnerabilities Can Teach Us About Protecting the Supply Chain Older technologies used in industrial and critical infrastructure leave the sector highly vulnerable to attack, but organizations can take steps to better protect themselves.
Is an Attacker Living Off Your Land? Living-off-the-land attacks pose significant risks to organizations and, on top of that, are difficult to detect. Learn the basics about how these attacks operate and ways to limit their damage.