Tag: Microsoft
Cybersecurity Threat Advisory: Microsoft .NET vulnerability
This Cybersecurity Threat Advisory highlights a patched security flaw in Microsoft .NET and Visual Studio products that has been cited for active exploitation. To mitigate this vulnerability, users are advised to apply security updates as soon as possible. What is...
Pioneers in Tech: Logging birthday greetings to Gordon Bell
In this month’s edition of Pioneers in Tech, we wish a happy birthday to technology visionary Gordon Bell, who turns 89 August 19. Born in Kirksville, Missouri, Bell is a co-founder of what is today the Computer History Museum in...
Tech Time Warp: Remembering the Z80 SoftCard, Microsoft’s first hardware product
Microsoft’s success with the Surface doesn’t change the fact the tech giant is primarily known for software. After all, Windows and Microsoft Office are ubiquitous in corporate life. But don’t let these juggernauts erase memories of the Z80 SoftCard, Microsoft’s...
Cybersecurity Threat Advisory: OneNote malware delivery
Multiple threat actors are now using OneNote documents to deliver malware. In the last month alone, over 50 OneNote campaigns delivering different malware payloads through email attachments have been observed.
Pioneers in Tech: Charles Simonyi, the brain behind Word and Excel
It’s estimated at least 1.2 billion people worldwide use Microsoft Office products. The tech pioneer behind the flagship Office programs Word and Excel is the fascinating Charles Simonyi, whose Microsoft success has enabled him to become the first repeat space...
Tech Time Warp: The truth about shatter attacks
In this week’s Tech Time Warp, we’re looking back at August 2002, when security researcher Kristin Paget published a whitepaper on the dangers of “shatter attacks,” and Microsoft had more than a few quibbles with it.
Cybersecurity Threat Advisory: New Microsoft Azure vulnerability
Researchers at Point 42 discovered a flaw in Microsoft Azure’s Fabric, dubbed ‘FabricScape’, propagating the ongoing series of vulnerabilities that the platform has been facing. This vulnerability allows bad actors using Linux to escalate their own privileges to the extent...
Alternate cloud service providers are on the rise
A much larger percentage of IT organizations appear to be less committed to the top three cloud service providers as it becomes more apparent that the compute and storage platforms being delivered have become commodities. A survey of 458 development...
Cybersecurity Threat Advisory: Black Basta Ransomware Group threat
The Black Basta ransomware group is revamping an older malware known as Qbot, Qakbot and Plinkslipbot to exploit the Microsoft Exchange Server. A successful attack will allow threat actors the ability to gain target network access, collect critical personal information,...
Tech Time Warp: Computer users smell a RAT
The tech acronym “RAT” has two meanings: “remote administration tool,” or the software your friendly network administrator uses to install software or troubleshoot your computer issues, and “remote access trojan,” or the malware a nefarious individual uses to wreak havoc...