Xbox returns to gamescom Aug. 21-25

Xbox returns to gamescom to connect with fans in Cologne, Germany, from Aug. 21-25. The Xbox booth will feature over 50 gaming titles from Xbox Game Studios, Blizzard, Bethesda and third-party partners – spread across more than 240 gaming stations – alongside photo ops and experiences, and specially constructed theaters for exclusive looks at upcoming […]

Windows 365 at three years: Customer-centric solutions for security, management and productivity

On the third-year anniversary of Windows 365, we’re reflecting on what our customers have accomplished in the last three years. You have navigated the complex and changing realities of the hybrid workplace, found new ways to move aspects of your business to the cloud, and kept employees and critical business operations connected and running in […]

Over 1 Million Domains at Risk of ‘Sitting Ducks’ Domain Hijacking Technique

Over a million domains are susceptible to takeover by malicious actors by means of what has been called a Sitting Ducks attack. The powerful attack vector, which exploits weaknesses in the domain name system (DNS), is being exploited by over a dozen Russian-nexus cybercriminal actors to stealthily hijack domains, a joint analysis published by Infoblox […]

Hackers Distributing Malicious Python Packages via Popular Developer Q&A Platform

In yet another sign that threat actors are always looking out for new ways to trick users into downloading malware, it has come to light that the question-and-answer (Q&A) platform known as Stack Exchange has been abused to direct unsuspecting developers to bogus Python packages capable of draining their cryptocurrency wallets. “Upon installation, this code […]

Zooming In: 6 Ways Cybercriminals Use the Black Market to Steal Zoom User Data

Originally published by Abnormal Security.In the wake of the COVID-19 pandemic, video conferencing platforms like Zoom experienced an unprecedented surge in popularity. However, this increased usage also attracted the attention of cybercriminals who sought to exploit the platform’s growing user base. Here, we’ll take a look at the methods used to obtain stolen Zoom accounts, […]