Cloud Consultancy News
iOS 15.5 and macOS 12.4 bring updates to Podcasts, digital payments, and more
Apple released new software updates for all of its platforms yesterday. That includes the following: iOS 15.5 for iPhones and the iPod touch iPadOS 15.5 for iPads macOS 12.4 for Macs watchOS 8.6 for the Apple Watch tvOS 15.5 for the Apple TV HomePod Software 15.5 for...
Password reuse is rampant among Fortune 1000 employees
SpyCloud published an annual analysis of identity exposure among employees of Fortune 1000 companies in key sectors such as technology, finance, retail and telecommunications. Drawing on a database of over 200 billion recaptured assets, researchers identified over 687...
Microsoft Announces Secure Network for Edge
Microsoft is moving forward with its plan to add a built-in VPN to its Edge browser. Enter the Microsoft Edge Secure Network, which is now available for select Insiders on the Canary channel. The Secure Network should give Edge users some peace of mind when using the...
Hundreds of Thousands of Konica Printers Vulnerable to Hacking via Physical Access
Researchers at Atos-owned cybersecurity consulting firm SEC Consult analyzed Konica Minolta printers to determine what could be achieved by an attacker who has physical access to a device. The answer: a lot! The analysis was conducted in late 2019 and it targeted...
Hackers are using tech services companies as a ‘launchpad’ for attacks on customers
A warning from international cybersecurity agencies has urged IT service providers and their customers to take action to protect themselves from the threat of supply chain attacks. The cybersecurity agencies warn that Russia's invasion of Ukraine has increased the...
Researchers Find 31,000 FTSE 100 Logins on Dark Web
Security experts have warned the UK’s leading companies that they may be unwittingly exposed to serious compromise after revealing the discovery of tens of thousands of corporate credentials on the dark web. Outpost24 used its threat monitoring tool Blueliv to trawl...
Nothing personal: Training employees to identify a spear phishing attack
Phishing attacks began years ago as simple spam, designed to trick recipients into visiting sites and becoming customers. In the meantime, they have morphed into a worldwide criminal industry. In recent years, threat actors have refined their methods of phishing,...
Google, Apple, and Microsoft Agree to Make Passwords a Thing of the Past
Passwords are a hassle, and unfortunately, they’re often a security risk. Even when a password is complicated, it may be compromised through brute-force attacks, leaks, or malware. That’s why Apple, Google, and Microsoft are now collaborating on our passwordless...
New phishing warns: Your verified Twitter account may be at risk
Phishing emails increasingly target verified Twitter accounts with emails designed to steal their account credentials, as shown by numerous ongoing campaigns conducted by threat actors. Verified accounts on Twitter are designated by a blue check next to their name,...
Microsoft Teams new features: Here’s what has been added in the past month
Microsoft has detailed a range of new features added to its Teams collaboration and team-working software during the past month, including automatic music detection, suggested replies, a new audio-sharing option, and Firefox support for Teams on the web. Microsoft's...