Tag: Microsoft

Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Microsoft .NET vulnerability

Cybersecurity Threat Advisory: Microsoft .NET vulnerability

This Cybersecurity Threat Advisory highlights a patched security flaw in Microsoft .NET and Visual Studio products that has been cited for active exploitation. To mitigate this vulnerability, users are advised to apply security updates as soon as possible. What is...

/ August 16, 2023
Pioneers in Tech
Pioneers in Tech: Logging birthday greetings to Gordon Bell

Pioneers in Tech: Logging birthday greetings to Gordon Bell

In this month’s edition of Pioneers in Tech, we wish a happy birthday to technology visionary Gordon Bell, who turns 89 August 19. Born in Kirksville, Missouri, Bell is a co-founder of what is today the Computer History Museum in...

/ August 11, 2023
Tech Time Warp: Remembering the Z80 SoftCard, Microsoft’s first hardware product

Tech Time Warp: Remembering the Z80 SoftCard, Microsoft’s first hardware product

Microsoft’s success with the Surface doesn’t change the fact the tech giant is primarily known for software. After all, Windows and Microsoft Office are ubiquitous in corporate life. But don’t let these juggernauts erase memories of the Z80 SoftCard, Microsoft’s...

/ March 31, 2023
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: OneNote malware delivery

Cybersecurity Threat Advisory: OneNote malware delivery

Multiple threat actors are now using OneNote documents to deliver malware. In the last month alone, over 50 OneNote campaigns delivering different malware payloads through email attachments have been observed.

/ February 7, 2023
Pioneers in Tech: Charles Simonyi, the brain behind Word and Excel

Pioneers in Tech: Charles Simonyi, the brain behind Word and Excel

It’s estimated at least 1.2 billion people worldwide use Microsoft Office products. The tech pioneer behind the flagship Office programs Word and Excel is the fascinating Charles Simonyi, whose Microsoft success has enabled him to become the first repeat space...

/ September 9, 2022
Tech Time Warp: The truth about shatter attacks

Tech Time Warp: The truth about shatter attacks

In this week’s Tech Time Warp, we’re looking back at August 2002, when security researcher Kristin Paget published a whitepaper on the dangers of “shatter attacks,” and Microsoft had more than a few quibbles with it.

/ August 5, 2022
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: New Microsoft Azure vulnerability

Cybersecurity Threat Advisory: New Microsoft Azure vulnerability

Researchers at Point 42 discovered a flaw in Microsoft Azure’s Fabric, dubbed ‘FabricScape’, propagating the ongoing series of vulnerabilities that the platform has been facing. This vulnerability allows bad actors using Linux to escalate their own privileges to the extent...

/ July 10, 2022
Alternate cloud service providers are on the rise

Alternate cloud service providers are on the rise

A much larger percentage of IT organizations appear to be less committed to the top three cloud service providers as it becomes more apparent that the compute and storage platforms being delivered have become commodities. A survey of 458 development...

/ July 6, 2022
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Black Basta Ransomware Group threat

Cybersecurity Threat Advisory: Black Basta Ransomware Group threat

The Black Basta ransomware group is revamping an older malware known as Qbot, Qakbot and Plinkslipbot to exploit the Microsoft Exchange Server. A successful attack will allow threat actors the ability to gain target network access, collect critical personal information,...

/ June 24, 2022
Tech Time Warp: Computer users smell a RAT

Tech Time Warp: Computer users smell a RAT

The tech acronym “RAT” has two meanings: “remote administration tool,” or the software your friendly network administrator uses to install software or troubleshoot your computer issues, and “remote access trojan,” or the malware a nefarious individual uses to wreak havoc...

/ June 3, 2022