Protect Your Organization from Outlook Phishing Attack using External Email Tagging

Phishing attacks are the top cybersecurity attacks in recent days. According to the Egress report, 85% of Microsoft 365 organizations reported phishing attacks last year. In phishing attacks, malicious actors send messages/emails pretending to be trusted persons or organizations. Employees are the first line of cyber defense. So, Office 365 admins should take the necessary […]

Single-core vs. multi-core CPUs

Some apps need CPU clock speed while others need multiple cores, so base your server purchases accordingly. In reviewing CPU and server benchmarks, you’ve undoubtedly noticed that testing covers both single-core and multi-core performance. Here’s the difference. In terms of raw performance, both are equally important, but single- and multi-core have areas of use where […]

Domain shadowing becoming extreme popular among cyber criminals

Threat analysts at Palo Alto Networks (Unit 42) discovered that the phenomenon of ‘domain shadowing’ might be more prevalent than previously thought, uncovering 12,197 cases while scanning the web between April and June 2022. Domain shadowing is a subcategory of DNS hijacking, where threat actors compromise the DNS of a legitimate domain to host their […]

Sharing our Machine Learning Model for YouTube Video Similarity

Today we are pleased to announce that the YouTube video similarity models used in our recent RegretsReporter research are now available on Hugging Face. The models are highly effective (~93% accuracy) at identifying whether two videos are similar, according to our policy. We hope that these models will prove valuable to other researchers investigating YouTube. […]