• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Project of the Week
  • About Us
    SEARCH

Search Results: malware

Microsoft Security RSA Conference

Microsoft: MFA Adoption At 22%

Despite an evolving cyberthreat landscape, just 22% of Microsoft Azure Active Directory customers have implemented MFA, passwordless tools.

February 7, 2022 Zachary Comeau Leave a Comment

Despite a cyberthreat landscape that continues to evolve and become even more dangerous, just 22% of Microsoft Azure Active Directory customers have implemented strong identify authentication protection, Microsoft says in a new report. In the company’s Cyber Signals report, a new quarterly cyber threat intelligence brief marketed to IT and security leaders, Microsoft says less […]

Read More

[redacted] Unveils TIDE to Automate and Scale Delivery of Layered Defense and Orchestrated Incident Response

February 2, 2022 TechDecisions Staff Leave a Comment

Expansion of Company’s State-of-the Art Platform Enables Prevention-Focused, Incident Response (IR); Lauren Pearce Joins from Los Alamos National Laboratory to Lead IR Practice SAN FRANCISCO–(BUSINESS WIRE)–[redacted], the mission-driven cloud security company that levels the playing field against attackers, today launched the Threat Intelligent Detection Engine (TIDE). As a major expansion of its cloud-native platform that […]

Read More

Insyde® Software Credits Binarly’s AI-Powered Firmware Threat Detection Technology for Recent Security Disclosures

February 1, 2022 TechDecisions Staff Leave a Comment

Today’s Published Security Disclosures Are Available on Insyde Software’s Website TAIPEI, Taiwan & HILLSBORO, Ore.–(BUSINESS WIRE)–Insyde® Software, a leading provider of UEFI (Unified Extensible Firmware Interface) and systems management BMC (Baseboard Management Controller) firmware, today announced that Binarly Inc., an AI-powered firmware protection platform provider, helped report previously unknown firmware vulnerabilities that have been officially […]

Read More

Immutability Specialist Codenotary Now Offers Trusted Software Supply Chain Assurance in a Fast, Easy, Inexpensive Cloud

February 1, 2022 TechDecisions Staff Leave a Comment

Codenotary Cloud reduces cost to identify vulnerabilities in software by 80% HOUSTON–(BUSINESS WIRE)–#Immutability—Codenotary, the immutability specialist that can instantly identify untrusted components in software, today announced Codenotary Cloud, a fast, easy, inexpensive way to determine where a vulnerability, such as Log4j, exists. Codenotary Cloud reduces the cost to almost instantly identify and remove unwanted artifacts […]

Read More

Trellix Sees Advanced Persistent Threat Actors and Ransomware Groups Focus on Financial Services in Third Quarter of 2021

January 31, 2022 TechDecisions Staff Leave a Comment

Key Findings In Q3 2021, the financial sector was the most targeted seeing 22% of ransomware and 37% of APT detections Publicly reported cyber incidents in the financial sector increased 21% compared to Q2 2021 Nearly half of APT activity monitored appears to originate from Russian and Chinese backed groups Cobalt Strike attack suite abused […]

Read More

Phishing Success

The Most Imitated Brands in Phishing Attempts

DHL has surpassed Microsoft’s long-standing reign as the brand most frequently imitated by cybercriminals via sophisticated phishing techniques.

January 25, 2022 TD Staff Leave a Comment

DHL has surpassed Microsoft’s long-standing reign as the brand most frequently imitated by cybercriminals in attempts to steal credentials or deploy malware via sophisticated phishing techniques. Twenty-three percent of all brand phishing attempts were related to DHL, up from just 9% in the previous quarter, according to Check Point Research’s latest Q4 brand phishing report. […]

Read More

Microsoft warns of macros-based malware

Microsoft Now Disables Excel Macros By Default

Admins have several options to access the setting and set group policies to limit the organization's exposure to ransomware.

January 24, 2022 Zachary Comeau Leave a Comment

Excel is now a little safer for organizations to use as Microsoft is making a once optional setting that disables the usage of Excel 4.0 macros the default. According to a Tech Community blog, the setting—which was rolled out as an optional setting in July 2021—is now the default when users open Excel 4.0 macros. […]

Read More

Active Directory Misconfigurations

Why Active Directory Attack Paths are the Secret to Many Successful Ransomware Attacks

By gaining control of an organization’s AD, the adversary seizes the power to deploy ransomware to all systems through several mechanisms.

January 19, 2022 Andy Robbins Leave a Comment

It’s no secret that most major enterprises across the globe use Microsoft Active Directory (AD) for identity and access management. This ubiquity is also one of the predominant reasons AD is such a popular and attractive target for adversaries. What remains a mystery to many enterprises, however, is how adversaries – including the malicious actors […]

Read More

Threat Detection Trends, 2023 Hacking Trends, Expel

This is What A Russian Cyberattack Looks Like

In light of recent geopolitical events involving Russia, U.S. agencies release detailed guidance on how to spot a Russian cyberattack.

January 18, 2022 Zachary Comeau Leave a Comment

Many organizations that have valuable data or even come close to touching sectors of the U.S. government are likely fending off cyberattacks from nation-state countries, with Russia among the top such threats. Now, due to increasing tensions between Russia, Ukraine and western countries, IT and cybersecurity professionals should be on the lookout for sophisticated threat […]

Read More

Crowdstrike Charlotte AI

CrowdStrike Releases Free Incident Response Tracker

CrowdStrike's new free Incident Response Tracker gives security incident response teams a consolidated view of the attack.

January 13, 2022 Zachary Comeau Leave a Comment

Cybersecurity giant CrowdStrike has released a free incident response tracker to help IT and security teams document indicators of compromise, compromised systems and a timeline of important events during its forensic analysis of an attack. The company calls the tool the CrowdStrike Incident Response Tracker, which is essentially an organized spreadsheet to help teams document […]

Read More

  • « Go to Previous Page
  • Page 1
  • Interim pages omitted …
  • Page 18
  • Page 19
  • Page 20
  • Page 21
  • Page 22
  • Interim pages omitted …
  • Page 47
  • Go to Next Page »

Primary Sidebar

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial Integrator Security Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Contact Us
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSEVENT STANDARDS OF CONDUCTYour Privacy ChoicesTERMS OF USEPRIVACY POLICY

© 2026 Emerald X, LLC. All rights reserved.