![]() ![]() In the last few weeks, Microsoft has removed Office 365 locations from the top 15 malware sites as noted on URLHaus.Ĭan you block such locations without causing issues with business needs at the firm? Some employees should have no need to go to certain sites, but others will have these needs. Until recently it took a long time to remove malicious files from these locations. Sites like these appeal to attackers because we trust them and tend to be less paranoid about the links they deliver. ![]() ![]() Repositories such as GitHub have recently been used to launch ransomware attacks. Google and Amazon Web Services (AWS) also can host malicious sites. OneDrive, OneNote, SharePoint, and Sharefile can all host malicious files. Attackers are now using more “interesting” platforms and methods to gain access to our networks, especially with cloud platforms.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |