• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Project of the Week
  • About Us
    SEARCH

Hacking

China, Hacking, Microsoft, Routers, Volt Typhoon

Microsoft, NSA Warn of Stealthy China-Sponsored Hacking Group Volt Typhoon

May 24, 2023 Zachary Comeau Leave a Comment

Microsoft is sounding the alarm on a group it calls Volt Typhoon, another state-sponsored hacking group based in China that is targeting critical infrastructure organizations and leveraging living-off-the-land techniques and proxying its network traffic through compromised network edge devices and routers to evade detection. Microsoft says Volt Typhoon is pursing development of capabilities that could […]

Read More

Microsoft Exchange Throttling Blocking

What is Going on With Microsoft Exchange Server Throttling and Blocking?

April 17, 2023 Zachary Comeau Leave a Comment

Microsoft is hoping to address the security issue of emails sent to Exchange online from unsupported and unpatched Exchange Servers by enabling a transport-based enforcement system in Exchange Online that will throttle and then block emails from an unsupported server. The end goal is to encourage Microsoft customers to stop using persistently vulnerable versions of […]

Read More

Lapsus$ Microsoft Okta

Lapsus$ Attacks: Microsoft Says Group Pays Employees For Initial Access; Okta Provides Attack Timeline

March 23, 2022 Zachary Comeau Leave a Comment

Microsoft acknowledges Lapsus$ accessed source code, downplays risk to customers and risk of elevation Lapsus$ uses extensive social engineering, including paying victims’ employees for initial access and convincing help desks to reset credentials Group uses VPNs, RDP, VDI and identity providers such as Azure AD, Okta in attacks Okta says 2.5% of customers potentially impacted […]

Read More

cybersecurity experts, ransomware

Why Cybersecurity Experts Choose the Good Side

December 28, 2020 Zachary Comeau Leave a Comment

As the world grapples with a pandemic, politics, social justice issues and other global crises, cybercriminals are taking advantage of those distractions and are launching attacks at a rapid pace. Cybersecurity and antivirus company Bitdefender found that pandemic-related attacks increased five-fold in the first two weeks of March. In May and June, an average of 60% […]

Read More

SolarWinds Hack, Hacking Campaign

Take Action Now: Massive Hacking Campaign Uses Popular IT Management Software From SolarWinds

December 14, 2020 Zachary Comeau Leave a Comment

A hacking group backed by a foreign government is conducting a global attack through the software supply chain and widely-used IT infrastructure management software from SolarWinds, according to cybersecurity company FireEye. The attack method appears to be linked to a compromise of FireEye’s own systems in a breach reported last week in which attackers stole […]

Read More

White House AI Regulations, ChatGPT, Generative AI

Report: Trump’s Twitter Account Easily Hacked By Dutch Security Researcher

October 22, 2020 Zachary Comeau Leave a Comment

Some of the best ways to avoid data breaches and cybersecurity compromise is to practice good password security and use other tools like two-factor authentication. That means using unique passwords that aren’t easy to guess and enabling multi-factor authentication on all of your accounts – including social media. U.S. President Donald Trump apparently didn’t get […]

Read More

Cybersecurity Risk

People Might Be Selling Your Instacart Order Info Online

July 31, 2020 TechDecisions Staff Leave a Comment

Instacart — the grocery delivery-on-demand app — could have suffered a data breach which affected hundreds of thousands of customers. According to a recent BuzzFeed report, the names, last four digits of credit card numbers, and order histories are popping up on dark web markets as a result of the supposed Instacart hack. The report […]

Read More

Fortinet, ransomware, zero day vulnerabilities, log4shell

Russian Military Hackers Have Exploited an Email Software

May 29, 2020 TechDecisions Staff Leave a Comment

A group of hackers affiliated with the Russian government has exploited flaws in an email software, according to the National Security Agency. Their recent advisory said the group, called “Sandworm team,” is a part of Russia’s military intelligence agency that exploited a vulnerability in Exim Mail Transfer Agent  since last August. More from a recent […]

Read More

Primary Sidebar

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial Integrator Security Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Contact Us
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSYour Privacy ChoicesTERMS OF USEPRIVACY POLICY

© 2025 Emerald X, LLC. All rights reserved.