Plato Data Intelligence.
Vertical Search & Ai.

Tag: Microsoft Exchange

Attackers Create Synthetic Security Researchers to Steal IP

During the month of May, an unknown threat group created a malicious GitHub repository that claimed to contain a zero-day exploit for a vulnerability...

Undetected Attacks Against Middle East Targets Conducted Since 2020

Businesses in the Middle East faced a series of targeted attacks over the past few years, with an open source tool used by threat...

‘Volt Typhoon’ Breaks Fresh Ground for China-Backed Cyber Campaigns

News this week that a likely China-backed threat actor is targeting critical infrastructure organizations in Guam has once again raised the specter of America's...

RA Ransomware Group Emerges With Custom Spin on Babuk

A newly discovered ransomware gang dubbed RA Group is ramping up its cyberattacks — the latest in a line of threat actors leveraging the...

APT41 Subgroup Plows Through Asia-Pacific, Utilizing Layered Stealth Tactics

After months of inactivity, Earth Longzhi — a suspected subgroup of the notorious APT41 — is again attacking organizations across industry targets in Southeast...

Linux Shift: Chinese APT Alloy Taurus Is Back With Retooling

After a brief hiatus, the Alloy Taurus APT (aka Gallium or Operation Soft Cell) is back on the scene, with a new Linux variant...

Tesla Model 3 Hacked in Less Than 2 Minutes at Pwn2Own Contest

Researchers from France-based pen-testing firm Synacktiv demonstrated two separate exploits against the Tesla Model 3 this week at the Pwn2Own hacking contest in Vancouver....

10 Vulnerabilities Types to Focus On This Year

Keeping applications and networks secure can seem like a Sisyphean task. No matter how much time and resources security and IT teams devote to...

10 Vulnerability Types to Focus On This Year

Keeping applications and networks secure can seem like a Sisyphean task. No matter how much time and resources security and IT teams devote to...

Index your Microsoft Exchange content using the Exchange connector for Amazon Kendra

Amazon Kendra is a highly accurate and simple-to-use intelligent search service powered by machine learning (ML). Amazon Kendra offers a suite of data source...

Microsoft Patch Tuesday: 36 RCE bugs, 3 zero-days, 75 CVEs

by Paul Ducklin Deciphering Microsoft’s official Update Guide web pages is not for the faint-hearted. Most of the information you need,...

Cybercriminals Target Telecom Provider Networks

The growing use of mobile devices for multifactor authentication increasingly has made telecom providers a juicy target for cybercrime. An ongoing SIM card-swapping campaign...

Latest Intelligence

spot_img
spot_img
spot_img

Chat with us

Hi there! How can I help you?