Microsoft Disrupts Large-Scale BEC Campaign Across Web Services Attackers had used the cloud-based infrastructure to target mailboxes and add forwarding rules to learn about financial transactions.
Is an Attacker Living Off Your Land? Living-off-the-land attacks pose significant risks to organizations and, on top of that, are difficult to detect. Learn the basics about how these attacks operate and ways to limit their damage.
Keeping Your Organization Secure When Dealing With the Unexpected There's no way to anticipate every possible scenario, but the right approach to business continuity can help you respond effectively in any situation.