10 Ottobre 2024
​​Cyber Signals Issue 8 | Education under siege: How cybercriminals target our schools​​

Introduction | Security snapshot | Threat briefingDefending against attacks | Expert profile  Education is essentially an “industry of industries,” with K-12 and higher education enterprises handling data that could include health records, financial data, and other regulated information. At the same time, their facilities can host payment processing[…]

Read More
9 Ottobre 2024
AI solutions and data platforms for the aviation industry

Introducing a new industry reference architecture for airlines and airports The aviation industry is entering a new era: airlines and airports worldwide are on the brink of transformation, driven by the power of generative AI. This powerful technology is creating new value at every stage of the aviation[…]

Read More
9 Ottobre 2024
AI solutions and data platforms for the aviation industry

Introducing a new industry reference architecture for airlines and airports The aviation industry is entering a new era: airlines and airports worldwide are on the brink of transformation, driven by the power of generative AI. This powerful technology is creating new value at every stage of the aviation[…]

Read More
8 Ottobre 2024
File hosting services misused for identity phishing

Microsoft has observed campaigns misusing legitimate file hosting services increasingly use defense evasion tactics involving files with restricted access and view-only restrictions. While these campaigns are generic and opportunistic in nature, they involve sophisticated techniques to perform social engineering, evade detection, and expand threat actor reach to other[…]

Read More
8 Ottobre 2024
File hosting services misused for identity phishing

Microsoft has observed campaigns misusing legitimate file hosting services increasingly use defense evasion tactics involving files with restricted access and view-only restrictions. While these campaigns are generic and opportunistic in nature, they involve sophisticated techniques to perform social engineering, evade detection, and expand threat actor reach to other[…]

Read More