• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Project of the Week
  • About Us
    SEARCH

Search Results: malware

Phishing Success

Ukraine-related Phishing Emails Up More than 200%

Hackers are exploiting the Ukraine crisis to conduct donation scams, deploy malware and steal credentials, Tessian says.

April 6, 2022 Zachary Comeau Leave a Comment

Similar to how cybercriminals jumped on the COVID-19 and used the pandemic as a useful phishing lure, attackers are exploiting the Ukraine crisis to conduct email-based donation scams, deploy malware and steal credentials. According to email security firm Tessian, researchers are seeing Ukrainian-themed phishing emails skyrocket, with new domains containing “Ukraine” up more than 200% […]

Read More

Windows 11, Windows 365 Boot, IT management, privacy, security,

Security, IT Management Highlight New Windows 11 Features

Microsoft is bringing dozens of new IT features to Windows 11 and Windows 365, including new security and new management capabilities.

April 5, 2022 Zachary Comeau Leave a Comment

Microsoft has unveiled what it has in store for Windows 11 and Windows 365 for commercial customers and IT managers, including new features in security, management, productivity and collaboration. The announcements came during the company’s  Windows Powers the Future of Hybrid Work event, one quarter through the first full year of Windows 11, and are largely […]

Read More

MITRE Engenuity ATT&CK® Evaluations Announces Results from Fourth Round of Enterprise Evaluations

March 31, 2022 TechDecisions Staff Leave a Comment

ATT&CK Evaluations Emulate Wizard Spider and Sandworm Threat Groups MCLEAN, Va., & BEDFORD, Mass.–(BUSINESS WIRE)–MITRE Engenuity ATT&CK® Evaluations (Evals), a program of MITRE Engenuity™, MITRE’s tech foundation for public good, today released its fourth round of independent ATT&CK Evaluations for enterprise cybersecurity solutions, highlighting results across 30 vendors. MITRE Engenuity helps government and industry combat […]

Read More

zoom chat leader, Enterprise Sound Bar Collaboration Kit, videoconferencing, cybersecurity

Must-Have Cybersecurity Features for Videoconferencing

Videoconferencing platforms are emerging as a new target for cyberattacks. Here are some cybersecurity actions to take to secure your calls.

March 30, 2022 TD Staff Leave a Comment

George Waller, EVP and co-founder of StrikeForce Technologies, an entrepreneur and technologist with over two decades in the cybersecurity and computer industries offers insights into must have cybersecurity features for videoconferencing and how we should be thinking about meetings in the future. Q: What are the top cybersecurity and data privacy concerns with general purpose […]

Read More

Log4Shell, Log4j, CVE-2021-44228

VMware Horizon Servers Still Under Log4Shell Attacks

Hackers are still using the Log4Shell exploit to attack VMware Horizon servers and deploy cryptominers and backdoors, according to Sophos.

March 29, 2022 Zachary Comeau Leave a Comment

Hackers are continuing to leverage the Log4Shell vulnerability to attack VMware Horizon servers and deploy cryptocurrency mining malware and backdoors, with a large wave of such attacks from mid-January still ongoing, according to cybersecurity firm Sophos. In a new report, Sophos says the attempts to leverage Horizon continued and grew in number throughout January and […]

Read More

Trellix and CSIS Find Organizations Outmatched by Nation-State Cyber Threat Actors

March 28, 2022 TechDecisions Staff Leave a Comment

Report Highlights Increased Government Support Required to Defend Against Sophisticated Nation-States NEWS HIGHLIGHTS 86 percent of respondents believe they have been targeted by a cyberattack conducted by a group acting on behalf of a nation-state Only 27 percent of respondents said they have complete confidence in the ability of their organization to differentiate between nation-state […]

Read More

How Fast Does Ransomware Encrypt Files?

Research from Splunk suggests some ransomware groups have an encryption speed of mere minutes, with LockBit being the fastest.

March 25, 2022 Zachary Comeau Leave a Comment

For IT and cybersecurity professionals, ransomware has been the scourge of the earth over the last two years, as the cybercrime economy continues to grow and beat system administrators and network defense pros to the point of attack. One reason for the difficulty in preventing and responding to ransomware attacks is the speed with which […]

Read More

McAfee ransomware attack

51% of Small Businesses Don’t Have Cybersecurity Measures in Place

Despite the negative consequences, small business owners believe they are too small to be targeted for cyberattacks.

March 25, 2022 TD Staff Leave a Comment

According to a new study, a majority of small businesses have no protection against cyberattacks, suggesting that businesses and their consumers are vulnerable to hacking and identity theft. A study from Digital.com, an independent website for small business online tools, products and services, revealed that 51% of small businesses do not have protection against cyberattacks. […]

Read More

Phishing Success rates

Watch Out For This Chameleon Phishing Scheme

Trustwave SpiderLabs is warning of a chameleon-like phishing scheme that adapts its background page and logo depending on the user input.

March 25, 2022 TD Staff Leave a Comment

Security researchers at TrustWave SpiderLabs encountered a phishing scheme that acts like a chameleon by changing and blending its color based on its environment. The site adapts its background page and logo depending on the user input to trick victims into giving away their email credentials. The phishing scheme starts with an email asking the […]

Read More

Attivo Networks Extends Active Directory Assessment Capabilities to Azure Active Directory Covering Hybrid and Cloud Deployments

March 24, 2022 TechDecisions Staff Leave a Comment

FREMONT, Calif.–(BUSINESS WIRE)–#AttivoNetworks—Attivo Networks®, the experts in identity security and lateral movement attack prevention, announced today that it has expanded its identity infrastructure assessment technology for Azure Active Directory (AD). The new capabilities add hybrid environment support for continuous exposure visibility and provide remediation guidance for on-premises, cloud, and managed AD environments. Nearly 80 percent […]

Read More

  • « Go to Previous Page
  • Page 1
  • Interim pages omitted …
  • Page 14
  • Page 15
  • Page 16
  • Page 17
  • Page 18
  • Interim pages omitted …
  • Page 47
  • Go to Next Page »

Primary Sidebar

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial Integrator Security Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Contact Us
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSEVENT STANDARDS OF CONDUCTYour Privacy ChoicesTERMS OF USEPRIVACY POLICY

© 2026 Emerald X, LLC. All rights reserved.