• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Project of the Week
  • About Us
    SEARCH

Search Results: phishing

Trellix Sees Advanced Persistent Threat Actors and Ransomware Groups Focus on Financial Services in Third Quarter of 2021

January 31, 2022 TechDecisions Staff Leave a Comment

Key Findings In Q3 2021, the financial sector was the most targeted seeing 22% of ransomware and 37% of APT detections Publicly reported cyber incidents in the financial sector increased 21% compared to Q2 2021 Nearly half of APT activity monitored appears to originate from Russian and Chinese backed groups Cobalt Strike attack suite abused […]

Read More

Microsoft warns of macros-based malware

Microsoft Now Disables Excel Macros By Default

Admins have several options to access the setting and set group policies to limit the organization's exposure to ransomware.

January 24, 2022 Zachary Comeau Leave a Comment

Excel is now a little safer for organizations to use as Microsoft is making a once optional setting that disables the usage of Excel 4.0 macros the default. According to a Tech Community blog, the setting—which was rolled out as an optional setting in July 2021—is now the default when users open Excel 4.0 macros. […]

Read More

CORRECTING and REPLACING GRAPHIC New Outseer Fraud & Payments Report Shows Giant Increase in Brand Abuse Cyber Attacks, Jumping 274% Year-over-Year

January 19, 2022 TechDecisions Staff Leave a Comment

Worldwide 3-D Secure transaction volume accelerates further, increasing 50% year-over-year BEDFORD, Mass.–(BUSINESS WIRE)–Please replace the graphic with the accompanying corrected graphic. The release reads: NEW OUTSEER FRAUD & PAYMENTS REPORT SHOWS GIANT INCREASE IN BRAND ABUSE CYBER ATTACKS, JUMPING 274% YEAR-OVER-YEAR Worldwide 3-D Secure transaction volume accelerates further, increasing 50% year-over-year Outseer, the leader in […]

Read More

Active Directory Misconfigurations

Why Active Directory Attack Paths are the Secret to Many Successful Ransomware Attacks

By gaining control of an organization’s AD, the adversary seizes the power to deploy ransomware to all systems through several mechanisms.

January 19, 2022 Andy Robbins Leave a Comment

It’s no secret that most major enterprises across the globe use Microsoft Active Directory (AD) for identity and access management. This ubiquity is also one of the predominant reasons AD is such a popular and attractive target for adversaries. What remains a mystery to many enterprises, however, is how adversaries – including the malicious actors […]

Read More

Threat Detection Trends, 2023 Hacking Trends, Expel

This is What A Russian Cyberattack Looks Like

In light of recent geopolitical events involving Russia, U.S. agencies release detailed guidance on how to spot a Russian cyberattack.

January 18, 2022 Zachary Comeau Leave a Comment

Many organizations that have valuable data or even come close to touching sectors of the U.S. government are likely fending off cyberattacks from nation-state countries, with Russia among the top such threats. Now, due to increasing tensions between Russia, Ukraine and western countries, IT and cybersecurity professionals should be on the lookout for sophisticated threat […]

Read More

Cisco Talos Cloud RATs

Hackers Using Public Cloud Infrastructure, RATs to Deploy Malware

New research from Cisco Talos details how threat actors are increasingly using cloud services to carry out their malicious activities.

January 14, 2022 Zachary Comeau Leave a Comment

A new report from Cisco Talos, the IT vendor’s security research team, details how hackers are increasingly using public cloud services like Azure and AWS that eliminates the need to host their own infrastructure. Specifically, researchers narrowed in on a fall 2021 campaign that utilized variants of known remote access trojans that were deployed and […]

Read More

Introducing X-Meta, a Crypto Exchange Powered by Binance Cloud

January 11, 2022 TechDecisions Staff Leave a Comment

NEW YORK–(BUSINESS WIRE)–#Bitcoin–X-Meta, the brand-new crypto exchange powered by Binance Cloud which launched on 30th December 2021, will provide customers around the globe with an easy-to-use and highly secure crypto trading exchange service, offering a host of powerful and unique features. The exchange was developed as the main foundation of the Inflation Hedging Coin (IHC) […]

Read More

Google Microsoft Office Offline

Researchers Discover Google Docs Comment Exploit

Threat actors have used the attack to target 500 inboxes across 30 tenants, with hackers using over 100 different Gmail accounts.

January 7, 2022 Zachary Comeau Leave a Comment

Threat actors are leveraging the comment feature in Google Docs and other Google collaboration tools to send malicious content, primarily to Outlook users. According to new research from cybersecurity firm Avanan, hackers have found a way to use these useful collaboration tools from Google to target Outlook users, hitting over 500 inboxes across 30 tenants, […]

Read More

Microsoft Pluton

PCs Powered By Microsoft Pluton Will Become Available Later This Year

Microsoft Pluton is a security processor pioneered in Xbox and Azure Sphere designed to store sensitive data within the Pluton hardware.

January 5, 2022 Zachary Comeau Leave a Comment

The first Microsoft Pluton-powered PCs will become available later this year with Windows 11 as Lenovo and AMD announced during CES 2022 a new ThinkPad Z series laptops powered by AMD’s Ryzen-6000 Series processors which will integrate the Microsoft Pluton security processor. The Microsoft Pluton is a security processor first pioneered in Xbox and Azure […]

Read More

Frustrating IT Tickets

Have You Encountered These Five Frustrating IT Support Tickets?

From security issues to plugging in a docking station, here are some of the most frustrating IT support requests.

January 3, 2022 Zachary Comeau Leave a Comment

As IT professionals, your job is to help non-IT folks use technology to help them do their jobs and run an organization. However, most of those non-IT end users haven’t had the technical education and training you probably had—not to mention the many technology certifications you have added to your resume. That can create a […]

Read More

  • « Go to Previous Page
  • Page 1
  • Interim pages omitted …
  • Page 16
  • Page 17
  • Page 18
  • Page 19
  • Page 20
  • Interim pages omitted …
  • Page 37
  • Go to Next Page »

Primary Sidebar

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial Integrator Security Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Contact Us
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSYour Privacy ChoicesTERMS OF USEPRIVACY POLICY

© 2025 Emerald X, LLC. All rights reserved.