Estimated reading time: 3 minutes
When the discussion veers around topics like data security and breach, what are the kinds of organizations which, you think, are most likely at risk? The first answer that comes to your minds might be banks or big multinational...Information Technology, Network Security & Cybersecurity Updates
Estimated reading time: 3 minutes
Business Email Compromise (BEC), also known as “Man-In-The-Email” or “CEO Fraud”, is a sophisticated type of phishing attack, carried out through elaborate means and usually with devastating effect. The US’s Federal Bureau of Investigation (FBI) estimated that global business...Estimated reading time: 1 minute
The recent zero-day vulnerability CVE-2018-8440 in Windows Task Scheduler enables attackers to perform a privilege elevation on targeted machines. Microsoft has released a security advisory CVE-2018-8440 on September 11, 2018 to address this issue. According to Microsoft, successful exploitation...