iMyFone LockWiper Crack With Serial Key 2020

iMyFone LockWiper Crack With License Key 2020

Helps you bypass the iPhone passcode in case you forgot it and the device became unusable or you have to wait for a long time before attempting to unlock it again

Flvto Youtube Downloader Crack + Activator Download 2020

Flvto Youtube Downloader Crack With Activator Latest

With this simple and intuitive application, you can swiftly download all your favorite online videos to your computer, in just a couple of moves

Voicemod Crack + Serial Key Updated

Voicemod Crack Plus Serial Number

Real-time voice changer that works with any application and comes equipped with an extensive collection of voices and ambient effects

iVCam Crack With Serial Number Latest 2020

iVCam Crack + License Key

Use your iPhone or iPad as a wireless webcam and take full advantage of the powerful cameras these mobile devices are equipped with

Dolby Access Crack + Activator

Dolby Access Crack With Keygen

Take advantage of stunning sound quality and realism in your multimedia experiences, with sound that surrounds you with the help of this app that gives you a free trial of Dolby Atmos.


IT News

Jun 19
When it comes to how Microsoft updates Windows 10 each spring and fall, this year is looking a lot like 2019.
Jun 19
Cisco has added features to is flagship network control platform, DNA Center, that introduce new analytics and problem-solving capabilities for enterprise network customers.
Jun 18
Generics have been requested by Go programmers for years for the simplicity and flexibility they offer
Jun 17
Chuck Robbins said at the company's virtual customer conference that 2020 has brought lot of pain, sadness and anger, and detailed some technology upgrades.
Jun 17
The memory corruption flaws exist in a wide range of commercial and consumer devices, and can allow full takeover of them.
Jun 17
As global work-from-home initiatives show little sign of letting up, the Verizon-owned firm is unveiling upgrades it hopes will bring it in line with rivals like Zoom, Webex and LogMeIn.
Jun 16
New version of Google-built language focuses on compiler, runtime, and linker improvements


Use of cloud collaboration tools surges and so do attacks

The COVID-19 pandemic has pushed companies to adapt to new government-mandated restrictions on workforce movement around the world. The immediate response has been rapid adoption and integration of cloud services, particularly cloud-based collaboration tools such Microsoft Office 365, Slack and videoconferencing platforms. A new report by security firm McAfee shows that hackers are responding to this with increased focus on abusing cloud account credentials.

After analyzing cloud usage data that was collected between January and April from over 30 million enterprise users of its MVISION Cloud security monitoring platform, the company estimates a 50% growth in the adoption of cloud services across all industries. Some industries, however, saw a much bigger spike--for example manufacturing with 144% and education with 114%.

The use rate of certain collaboration and videoconferencing tools has been particularly high. Cisco Webex usage has increased by 600%, Zoom by 350%, Microsoft Teams by 300% and Slack by 200%. Again, manufacturing and education ranked at the top.

While this rise in the adoption of cloud services is understandable and, some would argue, a good thing for productivity in light of the forced work-from-home situation, it has also introduced security risks. McAfee's data shows that traffic from unmanaged devices to enterprise cloud accounts doubled.

"There's no way to recover sensitive data from an unmanaged device, so this increased access could result in data loss events if security teams aren't controlling cloud access by device type."

Cloud threats increased

Attackers have taken notice of this rapid adoption of cloud services and are trying to exploit the situation. According to McAfee, the number of external threats targeting cloud services increased by 630% over the same period, with the greatest concentration on collaboration platforms.

For its report, the company split suspicious login attempts and access into two categories: excessive usage from anomalous location and suspicious superhuman. Both have seen a similar surge and growth pattern over the time period analyzed.

Excessive usage from anomalous location. This category is for successful logins from locations that are unusual given the organization's profile, followed by the user accessing large quantities of data or performing a high number of privileged tasks.

Suspicious superhuman. This category is for logins by the same user from two geographically distant locations over a short period of time -- for example, if the same user logs into one service from one country and then minutes later access a service while using an IP address from a different country.

The transportation and logistics, education and government institutions have seen the largest increases of threat events detected in their cloud accounts. For transportation and logistics, the rise in threats was as high as 1,350%, followed by education with 1,114%, government with 773%, manufacturing with 679%, financial services with 571% and energy with 472%.

The top ten sources for external attacks against enterprise cloud accounts by IP address location have been Thailand, USA, China, India, Brazil, Russia, Laos, Mexico, New Caledonia and Vietnam.

"Many of these attacks are likely opportunistic, essentially 'spraying' cloud accounts with access attempts using stolen credentials," the McAfee researchers said. "However, several prominent industries are often targeted by external threat actors--in particular, financial services. These targeted attacks are often found to have a source in either China, Iran or Russia."

Credential stuffing attacks on the rise

The frequency of credential stuffing attacks, where criminals use lists of leaked or stolen username and password combinations to gain access to accounts, has grown significantly in recent years. Often the used credentials come from third-party data breaches and the attackers attempt to exploit the bad but still common practice of password reuse.

In a report released this year, security and content delivery company Akamai revealed that it observed 85.4 billion credential abuse attacks against organizations worldwide between December 2017 and November 2019. Of those, 473 million attacks targeted the financial sector.

To better protect their employees' cloud accounts and prevent unauthorized access, McAfee recommends that companies implement a cloud-based secure gateway so employees don't need to route their traffic through a VPN or use a cloud access security broker platform with strict policies for device checks and data controls. If employees need to use their personal devices to access corporate SaaS applications, conditional access should be placed on sensitive data.

This story, "Use of cloud collaboration tools surges and so do attacks" was originally published by CSO.