searchtwitterarrow rightmail strokearrow leftmail solidfacebooklinkedinplusangle upmagazine plus
Help Net Security - Daily information security news with a focus on enterprise security.
  • News
  • Features
  • Expert analysis
  • Videos
  • Reviews
  • Events
  • Reports
  • Whitepapers
  • Industry news
  • Product showcase
  • Newsletters
  • (IN)SECURE Magazine

Office 365

Get our top stories in your inbox

Attackers connect rogue devices to organizations’ network with stolen Office 365 credentials

January 27, 2022

Attackers are trying out a new technique to widen the reach of their phishing campaigns: by using stolen Office 365 credentials, they try to connect rogue Windows devices to …

Phishers are targeting Office 365 users by exploiting Adobe Cloud

January 13, 2022

Phishers are creating Adobe Creative Cloud accounts and using them to send phishing emails capable of thwarting traditional checks and some advanced threat protection …

Armorblox email security platform integrates with Microsoft Sentinel to help stop email-based BEC

November 21, 2021

Armorblox announced that it has joined the Microsoft Intelligent Security Association (MISA), a coalition of independent software vendors and managed security service …

Microsoft launches Privacy Management for Microsoft 365

October 20, 2021

Microsoft has made available Privacy Management for Microsoft 365, a new AI-based solution to help enterprises manage data privacy risks and build a privacy resilient …

Veeam updates support for cloud adoption and data protection

October 7, 2021

Veeam Software announced the new update to its flagship product, Veeam Backup & Replication, as well as multiple updates to its product portfolio that deliver enhanced …

Cloudflare announces free email offerings to prevent phishing and increase security

September 28, 2021

Cloudflare announced its entry into email security with new offerings to help solve email challenges in an easy-to-use way that gives customers more control. Now, users will …

Attackers are exploiting zero-day RCE flaw to target Windows users (CVE-2021-40444)

September 8, 2021

Attackers are exploiting CVE-2021-40444, a zero-day remote code execution vulnerability in MSHTML (the main HTML component of the Internet Explorer browser), to compromise …

Anomali XDR features extend visibility over a wider range of threat information sources

September 2, 2021

Anomali announced availability of its quarterly portfolio update. New XDR features and enhancements provide customers with the ability to align global threat intelligence with …

Check Point acquires Avanan to deliver email and collaboration suite security for organizations

August 31, 2021

Check Point Software Technologies announced the acquisition of Avanan. Avanan technology provides the highest level of security for emails and SaaS collaboration suites. …

Why you need to make Microsoft 365 a 24/7 security priority

August 25, 2021

It’s easy to take advantage of the Microsoft 365 service, but are you taking the steps to properly secure all the data your company is storing inside of it? For security …

PacketFabric Cloud Router site-to-site VPN support expands enterprise cloud networking options

August 12, 2021

PacketFabric announced that it has released native support of IPsec VPN tunnels as a connection type for its Cloud Router product. In addition, Cloud Router now supports …

A clever phishing campaign is targeting Office 365 users

August 4, 2021

Microsoft is warning about an ongoing, “sneakier than usual” phishing campaign aimed at Office 365 users. An active phishing campaign is using a crafty combination …

Posts navigation

1 2 3 4 5 … 7

Featured news

  • Hijacking of popular ctx and phpass packages reveals open source security gaps
  • Sigstore: Signature verification for protection against supply chain attacks
  • Review: Hornetsecurity 365 Total Protection Enterprise Backup
Easily migrate to the cloud with CIS Hardened Images

What's new

New infosec products of the week: May 27, 2022

What is keeping automotive software developers up at night?

How to eliminate the weak link in public cloud-based multi-party computation

80% of consumers prefer ID verification when selecting online brands

Don't miss

How to eliminate the weak link in public cloud-based multi-party computation

GM, Zola customer accounts compromised through credential stuffing

Hijacking of popular ctx and phpass packages reveals open source security gaps

Sigstore: Signature verification for protection against supply chain attacks

Why are current cybersecurity incident response efforts failing?

Help Net Security - Daily information security news with a focus on enterprise security.
Follow us
  • Features
  • News
  • Expert Analysis
  • Reviews
  • Events
  • Reports
  • Whitepapers
  • Industry news
  • Newsletters
  • Product showcase
  • Twitter

In case you’ve missed it

  • Data centers on steel wheels: Can we trust the safety of the railway infrastructure?
  • Good end user passwords begin with a well-enforced password policy
  • Keep your digital banking safe: Tips for consumers and banks
  • Is cybersecurity talent shortage a myth?

(IN)SECURE Magazine ISSUE 71 (March 2022)

  • Why security strategies need a new perspective
  • The evolution of security analytics
  • Open-source code: How to stay secure while moving fast
Read online
© Copyright 1998-2022 by Help Net Security
Read our privacy policy | About us | Advertise