Not all ransomware strains are created equally. Some are designed as slow burns that will infect a target system, expanding its reach for days, or even weeks before striking and locking your business critical files. Others are designed to hit fast and hard. Lockbit definitely falls into this latter category, based on a detailed analysis […]
With @Microsoft #AdvancedThreatProtection, #AzureSecurity, and #AzureSentinel you can reduce the number of security vendors you manage and safeguard your organization, without sacrificing productivity. Together they form a complete, intelligent solution that helps secure corporate data and protect against bad actors, while taking advantage of the transformative opportunities presented by cloud computing. Watch the video to learn more.
Malware comes in all shapes and sizes. Some strains copy and encrypt files. Others serve annoying ads. Still others work quietly in the background, mining this or that cryptocurrency using your computer’s processing power to do it. GravityRAT is a different sort of creature. It has been actively developed since at least 2015 by Pakistani […]
Deep Fakes are becoming an increasingly large problem. If you’re not familiar with the term, a Deep Fake is an advanced photo or video technique in which an existing person in a video is digitally overwritten by some other person. Want to make it look like a wholesome actress has a porn video on the […]
WordPress tends to take a light-handed approach when it comes to managing the legions of plugins that are compatible with the most popular blogging platform on the planet. This time, however, they’re taking a different approach. They’re forcing a security update to counter a dangerous bug in a wildly popular plugin that’s being used by […]
Score one for the good guys. A team led by Microsoft’s DCU (Digital Crimes Unit) that includes Symantec, NTT Ltd, ESET, and Lumen’s Black Lotus Labs is working on something new. They have launched a sustained, coordinated attack on Trickbot’s infrastructure in a bid to destroy it, preventing the hackers who control it from making […]
If you make frequent use of Adobe products, then you’ll definitely want to give priority to applying the latest security update offered by the company. It’s an out of band patch that impacts ten different products in the Adobe lineup and is aimed squarely at addressing a number of critical security flaws. Since this is […]
@Microsoft invests more than USD $1 billion annually on cybersecurity research, so you know your security is taken seriously. Check out this infographic to discover how your organization can benefit at enterprise scale with Azure Advanced Threat Protection. Contact Fusion Technology Solutions to learn more!
A great many malware strains are designed to engage quietly during a PC’s startup process and then idle in the background. They are in the system logging keystrokes, taking screen shots at periodic intervals and uploading them to a command and control server, or doing other nefarious things. Microsoft wants to limit malware’s ability to […]
Did you know Webber Wentzel law firm, one of South Africa’s most prominent law firms, is refreshing its digital transformation strategy with @Microsoft Office 365? Watch this video to see how the firm acts as a beacon of innovation for the industry, and learn how your organization can do the same!