Microsoft is rolling out passwordless login support over the coming weeks, allowing customers to sign in to Microsoft accounts without using a password.

The company first allowed commercial customers to rollout passwordless authentication in their environments in March after a breakthrough year in 2020 when Microsoft reported that over 150…


Apple users should immediately update all their devices — iPhones, iPads, Macs and Apple Watches — to install an emergency patch for a zero-click zero-day exploited by NSO Group to install spyware.

The security updates, pushed out by Apple on Monday, include iOS 14.8 for iPhones and iPads, as well…


Threat actors used a Safari zero-day flaw to send malicious links to government officials in Western Europe via LinkedIn before researchers from Google discovered and reported the vulnerability.

That’s the word from researchers from Google Threat Analysis Group (TAG) and Google Project Zero, who Wednesday posted a blog shedding more…


After announcing their exit from the ransomware business in favor of data theft extortion, the Babuk gang appears to have slipped back into their old habit of encrypting corporate networks.

The criminals are currently using a new version of their file-encrypting malware and have moved the operation to a new…


The Windows Server 2022 will be available before the end of 2021, primarily bringing the concept of Secure Core from Windows client to the server world with Secure Core Servers combining the Windows Containers improvements. Windows Server 2022, also known as vNext and Windows Server 21H2, has exciting new features…


A Compromise Assessment Test is a hunting test for suspicious activities on every layer of the suspected network to detect unknown security breaches, malware, and signs of unauthorized access. More specifically, the assessment seeks to find attackers currently in the environment or who have been active in the recent past.


What is SEO?

SEO stands for “Search Engine Optimization”. It expresses the practices that aim to increase and raise the quality of web traffic (the number of visits to a specific website) through unpaid search results on search engines, what is known as “Organic Search Results,” that is unpaid and regular, and searches.


Ransomware groups have always taken a more-is-more approach. If a victim pays a ransom and then goes back to business as usual-hit them again. Or don’t just encrypt a target’s systems; steal their data first, so you can threaten to leak it if they don’t pay up. The latest escalation…


  • The ‘Avaddon’ group has hit AXA Asia only a week after the firm decided to stop paying ransomware actors.
  • The hackers claim to have stolen 3 TB of sensitive documents from the firm and already leaked several.
  • AXA threatens to create a precedent in the field, closing the tap for…

For years, enterprise proprietors/managers have been using business cards that have transformed inquiries into customers. Growing an audience in a noisy world is hard, and remembering to

Bring a business card for conferences or outside meetings is regularly forgotten. …

Teknologiia Lebanon

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store