Cybersecurity

Hackers Increasingly Abusing Microsoft Graph API for Stealthy Malware Communications

Threat actors have been increasingly weaponizing Microsoft Graph API for malicious purposes with the aim of evading detection. This is done to “facilitate communications with command-and-control (C&C) infrastructure hosted on Microsoft cloud services,” the Symantec Threat Hunter Team, part of Broadcom, said in a report shared with The Hacker News.

Cybersecurity

New Guide Explains How to Eliminate the Risk of Shadow SaaS and Protect Corporate Data

SaaS applications are dominating the corporate landscape. Their increased use enables organizations to push the boundaries of technology and business. At the same time, these applications also pose a new security risk that security leaders need to address, since the existing security stack does not enable complete control or comprehensive monitoring of their usage.

DJing

Teenage Engineering EP-133 KO II review

The first in a series of “Pocket operators gone professional”, the EP-133 is a unique sampler with a lot of creative potential. Greg Scarth checks out what looks like a real bargain. Originally released in 2015, Teenage Engineering’s Pocket Operator series represented a new level of affordability for the Swedish boutique audio brand, which until […]