Microsoft has expanded free Purview Audit logging capabilities for all U.S. federal agencies six months after disclosing that Chinese hackers stole U.S. government emails undetected in an Exchange Online breach between May and June 2023. […]
Author Archives: [email protected]
Security researchers are warning of hackers abusing the Google Cloud Run service to distribute massive volumes of banking trojans like Astaroth, Mekotio, and Ousaban. […]
A new report commissioned by OpenText, released yesterday, indicates that IT departments are playing a major role in achieving corporate sustainability objectives, but concludes a lack of innovative tools and expertise are primary roadblocks to allowing them to meet their goals. The 2023 State of IT Sustainability Report, conducted by Dimensional Research, found that while […]
Two Chinese nationals face 20 years in prison after being caught and convicted of submitting over 5,000 fake iPhones worth more than $3 million to Apple with the goal of having them replaced with genuine devices. […]
Over 50 per cent of Canadian technology managers plan to hire in the first half of 2024 despite persisting challenges to find skilled talent, a new study by hiring platform Robert Half reveals. Respondents included executives, senior managers and workers from small (20-249 employees), medium (250-499 employees) and large (500+ employees) businesses in private, publicly […]
For years, cybersecurity experts have been warning organizations of the importance of identity and access management processes — including password management and protection against compromise of multifactor authentication — to secure IT assets. A new report from IBM, released Wednesday, suggests failure to do that is increasingly costing firms badly. Abusing valid accounts was in […]
Opposition MPs hammered the head of the Public Health Agency of Canada (PHAC) on Tuesday for its role in not tightly overseeing the $59 million spent on the ArriveCAN app, but failed to get answers to repeated demands asking who made decisions. The Public Health Agency of Canada (PHAC) and the Canada Border Services Agency […]
A threat actor is using an open-source network mapping tool named SSH-Snake to look for private keys undetected and move laterally on the victim infrastructure. […]
CISA, the FBI, and the Environmental Protection Agency (EPA) shared a list of defense measures U.S. water utilities should implement to better defend their systems against cyberattacks […]
Both technical details and proof-of-concept exploits are available for the two vulnerabilities ConnectWise disclosed earlier this week for ScreenConnect, its remote desktop and access software. […]