Connect with us

Hi, what are you looking for?

cyber attackers are taking advantage of Google and Microsoft to perform malicious activities

Security

cyber attackers are taking advantage of Google and Microsoft to perform malicious activities

Hackers are using Google and Microsoft for their malicious activities. The technology is there to make things easier for people but the hackers are a hindrance to it. According to Proofpoint which is a cybersecurity company, hackers are using advanced technologies like cloud computing and virtual collaboration software. On one of the Proofpoint blogs, Ryan Kalember, head of EVP cybersecurity strategy, mentioned that in the past year, more than 59 million malicious emails were distributed on these trusted platforms.

This is a wise move because Google and Microsoft are the two most trusted platforms. And no one would suspect that they were the victims of such a misdemeanor. More than 90 million messages have been sent through Google services. What if I tell you that 27% of them are received via Gmail, which is one of the most popular email sites in the world? This is not limited to last year’s problem, because there were at least 7 million malicious messages through Office 365 in the first half of this year.

Because these websites have a large number of subscribers and are the most popular among subscribers, their reliability surpasses any botnet. It takes too long to detect these crimes and is very difficult on the most trusted platform. In fact, hackers are the worst, and of all the things they can destroy, the worst attempt is to steal email credentials. Don’t be surprised if I tell you that this is exactly what these bad guys do. This is one of the oldest and smartest techniques. In the past 12 months, criminals have tried various vulnerabilities, hacking approximately 95% of companies through their cloud accounts.

Japan shocked the world with data transmission within a radius of 3,000 kilometers with the highest Internet speed of 319 terabits per second

These criminals managed to make more than half of these organizations suffer from various adversities like Processing documents and sending e-mails. These planners once had an account, they sent emails to thousands of employees posing as executives. Unfortunately, Ryan Kemberley also freely shared the following details with us: Proofpoint analysis shows how attackers use Microsoft and Google as a cover and use their infrastructure to send malicious messages. These hackers have combined more and more ransomware to hacking into cloud accounts. In such cases,  human-centered email security should be prioritized.

cyber attackers are taking advantage of Google and Microsoft to perform malicious activities

credit: Digital Information World

LAST THOUGHTS:

The technology is there to make things easier for people but the hackers are a hindrance to it. In fact, hackers are the worst, and of all the things they can destroy, the worst attempt is to steal email credentials. This is one of the oldest and smartest techniques.

mail2box786@gmail.com'
Written By

Click to comment

Leave a Reply

Your email address will not be published. Required fields are marked *

You May Also Like

Showbiz

Pakistani actress Neelam Munirka said that I always try to keep my job while I do not interfere in anyone’s affairs. Pakistani celebrity Neelam...

Celebrity

Catherine McBroom of The Ace Family is speaking out in defense of her husband Austin McBroom after one media outlet alleged that he has...

Entertainment

WWE After the Bell with Corey Graves and Vic Joseph will play host to special guests and surprises in the lead-up to WrestleMania 37 with daily episodes beginning...

Celebrity

Molly Ephraim became popular as Mike Baxter’s daughter on the sitcom Last Man Standing. However, most people don’t know her career highlights in her...

Advertisement