Brad Smith, President & Vice Chair at Microsoft discusses what has been learnt, so far, from the Ukraine Russia cyber conflict and looks at how this can easily spread beyond the borders of the conflicting nations: Defending Ukraine: Early Lessons from the Cyber War – Microsoft On the Issues
Back to Google’s “sentient” AI
Here are a couple of articles looking at the issues raised around Google’s AI chatbot, LaMDA (language model for dialog applications), because Blake Lemoine, an engineer working with the system, has claimed LaMDA is sentient. Google was not pleased – they suspended Blake, for publishing confidential company property. Google does …
Has June’s Patch Tuesday broken some Microsoft 365 sign-ins? UPDATE 22 June 2022
This post was first published on 20 June 2022 Update 22 June 2022 We have not had to wait for the next Patch Tuesday for the fix – Microsoft has issued an out-of-band patch for Windows: Windows emergency update fixes Microsoft 365 issues on Arm devices (bleepingcomputer.com) Original post There …
Continue reading “Has June’s Patch Tuesday broken some Microsoft 365 sign-ins? UPDATE 22 June 2022”
Microsoft versioning vulnerability – we have the solution
This is a ransomware encryption attack, that Octagon’s backup solution is designed to mitigate against. The attack exploits the Microsoft 365 versioning feature, when editing a file, saved in SharePoint or OneDrive. Once the threat actors gets into the cloud storage they can execute their attack and start encrypting your …
Continue reading “Microsoft versioning vulnerability – we have the solution”
Threat actors come up with yet another way to steal your Microsoft credentials…
I have just written this article, showing that more than 24billion stolen credentials are available for sale on the dark web: Now here is a voice mail phishing attack that is designed to steal your Microsoft credentials – so they can join the other 24 billion on the Dark Web: …
Continue reading “Threat actors come up with yet another way to steal your Microsoft credentials…”