January 28, 2019
The U.S. energy grid continues to be vulnerable to Aurora-like attacks that could cause blackouts lasting a year or more. Read more â¶
Ursnif Trojan is back with fileless persistence
The state of supply chain attacks: Why you should be wary of third-party providers
How to enable audit logs in Microsoft Office 365
I can get and crack your password hashes from email
Review: GreatHorn offers a better way to secure enterprise email
Building your forensic analysis toolset
his white papers discusses some of the gaps in Office 365 and why third-party solutions to supplement or replace some of the native capabilities in Office 365 is a good idea. Read more â¶
Also known as Dreambot, this new variant can deploy GandCrab ransomware through Microsoft Word macros. Read more â¶
FROM OUR BUSINESS PARTNERS
Safeguard yourself against snoops, and access blocked content with this no-log VPN service. NordVPN is just $2.99 per month for 3 years, if you sign up right now. Read more â¶
The weak link in your enterprise security might lie with partners and suppliers. Hereâs how to understand and mitigate that risk. Read more â¶
Audit logging of Office 365 mail reads makes forensics investigations of attacks much easier. Here's how to make sure it's enabled. Read more â¶
Malicious hackers can use a simple trick to get your Windows computer to authenticate to a remote server that captures your password hash â just by sending you an email. Take these steps to test for the vulnerability. Read more â¶
GreatHorn takes a modern and highly effective approach to protecting enterprise email that goes well beyond the capabilities of legacy mail scanners. Read more â¶
Every security team should have these types of digital forensics tools available. Many are free, and there are enough options to find one that suits your skills and approach. Read more â¶
This white paper focuses on the Top 10 security threats facing organizations and what can be done to address them. Read more â¶