Connect with us

Hi, what are you looking for?

Security

cyber attackers are taking advantage of Google and Microsoft to perform malicious activities

cyber attackers are taking advantage of Google and Microsoft to perform malicious activities

Hackers are using Google and Microsoft for their malicious activities. The technology is there to make things easier for people but the hackers are a hindrance to it. According to Proofpoint which is a cybersecurity company, hackers are using advanced technologies like cloud computing and virtual collaboration software. On one of the Proofpoint blogs, Ryan Kalember, head of EVP cybersecurity strategy, mentioned that in the past year, more than 59 million malicious emails were distributed on these trusted platforms.

This is a wise move because Google and Microsoft are the two most trusted platforms. And no one would suspect that they were the victims of such a misdemeanor. More than 90 million messages have been sent through Google services. What if I tell you that 27% of them are received via Gmail, which is one of the most popular email sites in the world? This is not limited to last year’s problem, because there were at least 7 million malicious messages through Office 365 in the first half of this year.

Because these websites have a large number of subscribers and are the most popular among subscribers, their reliability surpasses any botnet. It takes too long to detect these crimes and is very difficult on the most trusted platform. In fact, hackers are the worst, and of all the things they can destroy, the worst attempt is to steal email credentials. Don’t be surprised if I tell you that this is exactly what these bad guys do. This is one of the oldest and smartest techniques. In the past 12 months, criminals have tried various vulnerabilities, hacking approximately 95% of companies through their cloud accounts.

PITB is going to launch a freelancing training program in Balochistan for the very first time

These criminals managed to make more than half of these organizations suffer from various adversities like Processing documents and sending e-mails. These planners once had an account, they sent emails to thousands of employees posing as executives. Unfortunately, Ryan Kemberley also freely shared the following details with us: Proofpoint analysis shows how attackers use Microsoft and Google as a cover and use their infrastructure to send malicious messages. These hackers have combined more and more ransomware to hacking into cloud accounts. In such cases,  human-centered email security should be prioritized.

cyber attackers are taking advantage of Google and Microsoft to perform malicious activities

credit: Digital Information World

LAST THOUGHTS:

The technology is there to make things easier for people but the hackers are a hindrance to it. In fact, hackers are the worst, and of all the things they can destroy, the worst attempt is to steal email credentials. This is one of the oldest and smartest techniques.

mail2box786@gmail.com'
Written By

Click to comment

Leave a Reply

Your email address will not be published. Required fields are marked *

You May Also Like

Tech

The China Telecom site shared key details of the Open A35 before its launch. It shared price information, images, and specifications. MediaTek Helio P35...

Entertainment

WWE After the Bell with Corey Graves and Vic Joseph will play host to special guests and surprises in the lead-up to WrestleMania 37 with daily episodes beginning...

Mobile

iPhone SE3, The iPhone S, could not be released as a sequel 2020 this year. According to new reports, the iPhone SE 3 is...

Extra

Isn’t it tempting to know about Ethan Klein’s Net Worth? That’s why you’re here, and I assure you you’ll find the exact figure of...