Search results for: office 365


Nasuni acquires Storage Made Easy to strengthen its file data services

Nasuni announced it has acquired Storage Made Easy (SME), a file data management company that offers remote work and compliance solutions for cloud file storage. Financial details of the transaction are not being disclosed. The acquisition of SME is Nasuni’s second transaction within the last two months following a $60 million investment earlier in the year. One of today’s biggest challenges for data storage is the ability to make files accessible to users no matter … More

week in review

Week in review: Log4Shell exploitation, DevSecOps myths, 56 vulnerabilities impacting OT devices

Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: QNAP NAS devices hit by DeadBolt and ech0raix ransomware Taiwan-based QNAP Systems is warning consumers and organizations using their network-attached storage (NAS) appliances of a new DeadBolt ransomware campaign. Fake voicemail notifications are after Office365, Outlook credentials A phishing campaign using fake voicemail notifications has been and is still targeting various US-based organizations, in an attempt to grab employees’ Office365 … More

security platform

Cavelo unveils platform enhancements to minimize data exposure for midsized businesses

Cavelo announced the release of digital asset discovery, tracking, data access, vulnerability and risk reporting enhancements to help businesses discover sensitive data, minimize data exposure and support attack surface management initiatives. IT and security teams use a combination of processes and technologies to track digital assets (including hardware, software, cloud and sensitive data), and understand their business’s internal and external attack surface. However, legacy and disparate technologies can create data silos that limit visibility to … More


Rate of IT security incidents grows with company size

The rate of IT security incidents increases the more Microsoft 365 security features are used, according to Hornetsecurity. Organizations using Microsoft 365 and that use 1 or 2 of its stock security features reported attacks 24.4% and 28.2% of the time respectively, while those that use 6 or 7 features reported attacks 55.6% and 40.8% of the time respectively. Overall, it was found that 3 in 10 organizations (29.2%) using Microsoft 365 reported a known … More


OpenText Cloud Editions 22.2 helps businesses prepare for the next wave of disruption

OpenText announced Cloud Editions 22.2 featuring new capabilities and innovations that enable businesses to be agile, responsive, and resilient in a time when disruption is accelerating. As a global leader in information management, OpenText is powering and protecting businesses to achieve the information advantage by being intelligent, connected, and responsible. “Businesses need to be prepared for the next wave of disruption,” said Mark J. Barrenechea, OpenText CEO & CTO. “Understanding that information is exponential and … More

Office 365

Fake voicemail notifications are after Office365, Outlook credentials

A phishing campaign using fake voicemail notifications has been and is still targeting various US-based organizations, in an attempt to grab employees’ Office365 and Outlook login credentials, Zscaler warns. The campaing seems to be a repeat of a previous, similar one, and targets security solution providers, software security developers, supply-chain organizations in manufacturing and shipping, healthcare and pharmaceutical firms, and the US military. Zscaler was one among the targeted organizations, which allowed them to analyze … More


Kovrr partners with Microsoft to help enterprises mitigate their cyber risk exposure

Kovrr announced its selection by Microsoft for Startups, a global program dedicated to accelerating the trajectory of high-potential startups to enable growth at scale. As a program member, Kovrr will have exclusive access to Microsoft technology, mentorship and business support. Kovrr will enable Microsoft Security clients to transform their internal cyber security data in Microsoft Sentinel, Azure Defender and Microsoft 365 Defender products into financially quantified cyber risk management decisions. The integrations enable CISO’s, CIO’s, … More

Microsoft Office

Microsoft Office apps are vulnerable to IDN homograph attacks

Microsoft Office apps – including Outlook – are vulnerable to homograph attacks based on internationalized domain names (IDNs). In practice, this means that users hovering above a link in a phishing email or a Word or Excel document they have receieved can’t tell that it will direct them to a spoofed malicious domain that’s not what it purports to be. “Users, who are trained to validate a link in an email client before they click … More


Kroll acquires Crisp to accelerate its digital service capabilities

Kroll announced that it acquired Crisp, a real-time risk intelligence company that protects brands, assets and people from reputational damage, security threats and online harms. This acquisition will accelerate Kroll’s digital service capabilities with the leading expert in fast, actionable risk intelligence. Crisp’s AI technology has been trained over 16 years to discover and track the risk signals embedded within digital chatter. Its comprehensive suite of intelligence solutions serves the global enterprise needs of communications, … More

Infosec products of the month: May 2022

Here’s a look at the most interesting products from the past month, featuring releases from: AuditBoard, BIO-key, Cohesity, Corelight, Data Theorem, Deepfence, ForgeRock, Fortinet, Hunters, Enpass, iDenfy, Kasten by Veeam, Kingston Digital, Microsoft, N-able, Nasuni, Netenrich, Orca Security, PIXM, Qualys, SafeGuard Cyber, SecureAge, Skybox Security, Sonatype, Trusona, and Uptycs. Qualys Custom Assessment and Remediation empowers security teams to counter threats like zero-day attacks Qualys Custom Assessment and Remediation opens the Qualys Platform for security architects … More

Microsoft support

Zero-day bug exploited by attackers via macro-less Office documents (CVE-2022-30190)

A newly numbered Windows zero-day vulnerability (CVE-2022-30190) is being exploited in the wild via specially crafted Office documents (without macros), security researchers are warning. After initially dismissing the vulnerability as “not a security related issue”, Microsoft has now issued a CVE and has offered a temporary workaround until fixes can be provided. Detected attacks Boobytrapped office files delivered via email are one of the most common tactics attackers use to compromise endpoints, and they are … More

week in review

Week in review: Account pre-hijacking, Sigstore, ransomware still winning

Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: RansomHouse: Bug bounty hunters gone rogue? A new cybercrime outfit that calls itself RansomHouse is attempting to carve out a niche of the cyber extortion market for itself by hitting organizations, stealing their data, and offering to delete it and provide a full report on how and what vulnerabilities were exploited in the process – all for a fee, of … More