Cyberattacks on Cloud Collaboration Tools See Major Surge

Cyberattacks on Cloud Collaboration Tools See Major Surge

Cloud Computing
Cyberattacks on Cloud Collaboration Tools See Major Surge The COVID-19 pandemic and the resulting government-mandated home quarantine have pushed many organizations to adopt cloud collaboration tools to accommodate employees working from home. With the adoption surge, cyberattacks on cloud collaboration tools also see major increase. What Is Cloud Collaboration Tool? Microsoft's Office 365 is an example of a cloud collaboration tool. Office 365 allows users working in different geographical locations to work as a team, sharing files and attending meetings via chat or via videoconferencing. Slack is another example of a cloud collaboration tool. In addition to sharing files, Slack allows users easy conversation among groups or among certain members of a group. Cloud Collaboration Tools Adoption Cloud collaboration tools such as Office 365 and Slack have been around for…
Read More
Healthcare & Essential Services Involved in COVID-19 Response Targeted by Threat Groups

Healthcare & Essential Services Involved in COVID-19 Response Targeted by Threat Groups

IT Support, Security
Healthcare & Essential Services Involved in COVID-19 Response Targeted by Threat Groups The national cybersecurity agencies in two countries, the UK and the US, recently issued a joint alert warning that threat actors are targeting healthcare and essential services involved in the response to COVID-19. In a joint alert, the United Kingdom’s National Cyber Security Centre (NCSC) and United State’s Cybersecurity and Infrastructure Security Agency (CISA) warned that advanced persistent threat (APT) groups are targeting organizations involved in both national and international COVID-19 responses, including healthcare bodies, pharmaceutical companies, academia, medical research organizations and local governments. APT groups refer to malicious actors, typically nation-state or state-sponsored, whose sole purpose is to gain access to victims’ computer networks and remain there undetected for an extended period. According to NCSC and CISA,…
Read More