Your browser does not seem to support JavaScript. As a result, your viewing experience will be diminished, and you have been placed in read-only mode.
Please download a browser that supports JavaScript, or enable it if it's disabled (i.e. NoScript).
Malware loads itself from remote servers and bypasses Microsoft’s Defender AV scanner, according to reports.
https://threatpost.com/zero-day-follina-bug-lays-older-microsoft-office-versions-open-to-attack/179756/
A military email address was used to distribute malicious email macros among EU personnel helping Ukrainians.
https://threatpost.com/phishing-campaign-targeted-those-aiding-ukraine-refugees/178752/
A large-scale, automated typosquatting attack saw 200+ malicious packages flood the npm code repository, targeting popular Azure scopes.
https://threatpost.com/microsoft-azure-developers-pii-stealing-npm-packages/179096/
Defending against ransomware will take a move to zero-trust, argues Daniel Spicer, CSO, Ivanti.
https://threatpost.com/ransomware-attacks-evolving-security-strategy/175835/