• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Project of the Week
  • About Us
    SEARCH

Proofpoint

3CX Supply Chain Attack

Emotet Pivots From Office Macros to OneDrive URLs and PowerShell, Security Researchers Warn

April 27, 2022 Zachary Comeau Leave a Comment

Notorious botnet Emotet is reportedly testing out new attack methods that bypass new Microsoft protections against Macros in Office documents and leverage OneDrive URLs and PowerShell. The Emotet botnet began its reemergence in November 2021 after its January 2021 takedown by a multinational coalition of law enforcement, with the group associated with the botnet targeting […]

Read More

Social Engineering

5 Strangest Social Engineering Tactics of 2021

March 3, 2022 TD Staff Leave a Comment

Cyber attackers can be quite inventive when it comes to social engineering and persuading someone to do something that isn’t always in their best interest— logging into a phishing site and entering their credentials, luring victims to pay a fake invoice, or simply opening a file containing malware. Cybersecurity firm Proofpoint rounded up the top […]

Read More

Phishing Success

Phishing, Ransomware Continue To Plague Businesses As Awareness Stagnates

February 22, 2022 Zachary Comeau Leave a Comment

More than two-thirds were infected with ransomware from a direct email payload, and 60% of those victims paid the ransom, according to new research from cybersecurity and compliance firm Proofpoint. The company’s 2022 State of the Phish Report, the results of a survey of 600 IT professionals and 3,500 workers, reveals that phishing and other […]

Read More

Beyond Identity

Phishing Attacks That Bypass MFA Could Become The Norm

February 4, 2022 Zachary Comeau Leave a Comment

Multi-factor authentication (MFA) is now a standard cybersecurity practice—or at least it should be—across an organization’s IT environment. MFA has been proven to stop hackers from accessing accounts and thwart ransomware attacks from happening with compromised credentials alone. However, like with most IT security safeguards, cybercriminals are finding ways around it with phishing attacks that […]

Read More

  • « Go to Previous Page
  • Page 1
  • Page 2

Primary Sidebar

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial Integrator Security Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Contact Us
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSYour Privacy ChoicesTERMS OF USEPRIVACY POLICY

© 2025 Emerald X, LLC. All rights reserved.