• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Project of the Week
  • About Us
    SEARCH

Search Results: phishing

3CX Hack Supply Chain attack compromise

These Destructive Malware Strains Have Targeted Organizations in Ukraine

There are now three different strains of destructive malware that have been identified in cyberattacks against organizations in Ukraine.

March 2, 2022 Zachary Comeau Leave a Comment

There are now three different strains of destructive malware that have been identified in cyberattacks against organizations in Ukraine, and IT security professionals should be aware of both, especially as cybersecurity experts expect a broader range of cyberattacks to target Western organizations as the U.S. and allies respond to the crisis. Both strains of malware, […]

Read More

Cyber Attack Trends Amid Russia-Ukraine Conflict

Cyber attacks against Ukraine has surged along with phishing emails and destructive malware amid the Russia/Ukraine conflict.

February 28, 2022 TD Staff Leave a Comment

Cyber attacks on Ukraine’s government and military sector surged by 196% within the first three days of Russia’s invasion on Feb. 24, 2022, compared to the start of the month, according to Check Point Research. The cybersecurity firm released its findings from the first few days of the conflict, finding that attacks against Ukraine far […]

Read More

Russia Cyberattack

10 Things IT Can Do To Harden Cyber Defenses Amid The Russia-Ukraine Conflict

With cyberattacks stemming from the Ukraine crisis possibly spilling over into the West, here are 10 cybersecurity steps IT can take now.

February 25, 2022 Zachary Comeau Leave a Comment

Cyberattacks have been front and center in the Ukraine crisis, as the country is not just suffering from conventional warfare as it fights with Russia. The country’s critical infrastructure has been repeatedly attacked, purportedly by hackers working for their next door adversary. These attacks have targeted government websites, infrastructure and more with DDoS attacks and […]

Read More

CISA Software Security

Supplement Your Cybersecurity Staff With These Free CISA Resources

CISA's catalog of free sources includes widely used open-source tools and services offered by private and public sector organizations.

February 22, 2022 Zachary Comeau Leave a Comment

The U.S. Cybersecurity and Infrastructure Security Agency has released a litany of free security tools and resources designed to help organizations advance its security capabilities, including widely used open-source tools and services offered by private and public sector organizations. The catalog of free resources comes amid rising geopolitical tensions that both government agencies and software […]

Read More

MIcrosoft Entra External ID

Microsoft Pushes Zero Trust Capabilities In Azure

Microsoft is going all-in on Zero Trust as it releases the public preview of new Azure AD security features this month and previews two more.

February 18, 2022 Zachary Comeau Leave a Comment

Microsoft is positioning itself as a partner in the U.S. government’s push toward a Zero Trust architecture, including the publication of resources designed to help organizations migrate to the cloud and adopt a Zero Trust framework and the release of Azure capabilities to help secure cloud environments. In a new blog, Microsoft outlined several resources, […]

Read More

ISG to Publish Comprehensive Study on Cybersecurity Products and Services

February 17, 2022 TechDecisions Staff Leave a Comment

Upcoming ISG Provider Lens™ report series examines providers of all major cybersecurity tools as enterprises deal with ransomware and remote work STAMFORD, Conn.–(BUSINESS WIRE)–$III #CyberSecurity–Information Services Group (ISG) (Nasdaq: III), a leading global technology research and advisory firm, has launched a research study examining providers of a wide range of cybersecurity products and services. The […]

Read More

Atera ESET Integration

Hackers Are Sending Malicious Files In Microsoft Teams

Avanan reveals how threat actors are compromising Office 365 accounts and sending malicious files in Microsoft Teams.

February 17, 2022 Zachary Comeau Leave a Comment

As Microsoft Teams boasts a growing user base that is now over 270 million monthly active users, hackers are targeting it as a launchpad for sending malicious files, according to a new report from cybersecurity firm Avanan. The company, a Check Point subsidiary, says it began last month observing hackers dropping malicious executable files in […]

Read More

DNSFilter Unveils AppAware For One-Click Application Blocking

February 17, 2022 TechDecisions Staff Leave a Comment

Blocks Over 100 Risky Applications With Unparalleled Usage Intelligence WASHINGTON–(BUSINESS WIRE)–DNSFilter today announced the release of AppAware, a next-generation application-blocking tool that enables organizations to seamlessly block common security threats. With AppAware, organizations can block over 100 high-risk applications—including filesharing, remote desktop and high-risk messaging apps—with a single click and instantly gain insights into the […]

Read More

Azure AD Unmanaged Accounts

This Azure AD Authentication Method Can Help With Zero Trust

The offering is designed to help customers meet phishing-resistant MFA requirements using PIV/CAC cards and move toward Zero Trust.

February 16, 2022 Zachary Comeau Leave a Comment

Microsoft has announced the public preview of Azure Active Directory certificate-based authentication across its commercial and U.S. government clouds, a response to President Joe Biden’s executive order on cybersecurity designed to push the government to zero trust. The offering is designed to help government customers meet phishing-resistant MFA using the PIV/CAC cards, and it can […]

Read More

CISA Warns of Increased Globalized Threat of Ransomware

Ransomware tactics and techniques are continuing to evolve and place an immediate threat to organizations globally.

February 16, 2022 Alyssa Borelli Leave a Comment

In 2021, 14 of the 16 U.S. critical infrastructure sectors were hit with ransomware, according to the CISA, FBI and NSA in a new report. And it’s not just happening the U.S., Australia’s critical infrastructure entities have been hit, as well as in the U.K. The education sector was one of the top U.K. sectors […]

Read More

  • « Go to Previous Page
  • Page 1
  • Interim pages omitted …
  • Page 14
  • Page 15
  • Page 16
  • Page 17
  • Page 18
  • Interim pages omitted …
  • Page 37
  • Go to Next Page »

Primary Sidebar

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial Integrator Security Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Contact Us
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSYour Privacy ChoicesTERMS OF USEPRIVACY POLICY

© 2025 Emerald X, LLC. All rights reserved.