Connect with us

Hi, what are you looking for?

Security

cyber attackers are taking advantage of Google and Microsoft to perform malicious activities

cyber attackers are taking advantage of Google and Microsoft to perform malicious activities

Hackers are using Google and Microsoft for their malicious activities. The technology is there to make things easier for people but the hackers are a hindrance to it. According to Proofpoint which is a cybersecurity company, hackers are using advanced technologies like cloud computing and virtual collaboration software. On one of the Proofpoint blogs, Ryan Kalember, head of EVP cybersecurity strategy, mentioned that in the past year, more than 59 million malicious emails were distributed on these trusted platforms.

This is a wise move because Google and Microsoft are the two most trusted platforms. And no one would suspect that they were the victims of such a misdemeanor. More than 90 million messages have been sent through Google services. What if I tell you that 27% of them are received via Gmail, which is one of the most popular email sites in the world? This is not limited to last year’s problem, because there were at least 7 million malicious messages through Office 365 in the first half of this year.

Because these websites have a large number of subscribers and are the most popular among subscribers, their reliability surpasses any botnet. It takes too long to detect these crimes and is very difficult on the most trusted platform. In fact, hackers are the worst, and of all the things they can destroy, the worst attempt is to steal email credentials. Don’t be surprised if I tell you that this is exactly what these bad guys do. This is one of the oldest and smartest techniques. In the past 12 months, criminals have tried various vulnerabilities, hacking approximately 95% of companies through their cloud accounts.

These criminals managed to make more than half of these organizations suffer from various adversities like Processing documents and sending e-mails. These planners once had an account, they sent emails to thousands of employees posing as executives. Unfortunately, Ryan Kemberley also freely shared the following details with us: Proofpoint analysis shows how attackers use Microsoft and Google as a cover and use their infrastructure to send malicious messages. These hackers have combined more and more ransomware to hacking into cloud accounts. In such cases,  human-centered email security should be prioritized.

cyber attackers are taking advantage of Google and Microsoft to perform malicious activities

credit: Digital Information World

LAST THOUGHTS:

The technology is there to make things easier for people but the hackers are a hindrance to it. In fact, hackers are the worst, and of all the things they can destroy, the worst attempt is to steal email credentials. This is one of the oldest and smartest techniques.

Content Protection by DMCA.com
Click to comment

Leave a Reply

Your email address will not be published. Required fields are marked *

You May Also Like

News

Phishing is one of the most well-known types of cyber attacks that ordinary people may eventually suffer. This has a lot to do with...

Apps

Instagram appears to have implemented a new feature that allows users to verify their custom insight posts on the web or desktop version of...

Apps

The clubhouse is one of the fastest-growing applications in the world. Since its release, the app has received a lot of competition, whether it’s...

News

As we all know, the Google Play store has real malware problems. Although the most popular applications that can be purchased or downloaded on...