Cybercrime and Social Media

Cybercrime and Social Media

Cybercrime and Social Media: What’s the Goal? Just as with a so-called “traditional” phishing campaign, these social media-specific cyberattacks employ the same tactics (phishing, ransomware, spam, malware). Some hackers even manage to take control of influencers’ official accounts to extract information from their followers in order to…

MICROSOFT EXCHANGE: SECURITY BREACH

Microsoft has identified a critical security vulnerability affecting Exchange Server 2010, 2013, 2016, and 2019. Hackers are already exploiting this vulnerability in cyberattacks. Only the on-premises version is affected (Exchange Online and Office 365 are not impacted). This vulnerability allows a group of…