September 2023

Shifting tactics fuel surge in business email compromise

In this eye-opening Microsoft Security Insider article, explore the shifting tactics employed by cybercriminals in business email compromise attacks. Read “Shifting tactics fuel surge in business email compromise” to gain valuable insights into cybercriminals’ strategies, techniques and motivations. Discover three steps you need to take to fortify defenses and mitigate potential risks. Knowledge is power. Build yours with this 9-minute read. Start now.

Read More…

Shifting tactics fuel surge in business email compromise Read More »

EDP: powering the global energy transition using Microsoft Intelligent Data Platform, AI and IoT technology

Portuguese energy provider EDP is on a mission to drive sustainability in the sector and become net zero by 2040. That begins with data. Over the past few years, the company has been migrating its IT system to the cloud and embracing a data-driven vision that’s allowing it to implement insights-based initiatives across its markets. Fast forward to present day, the organization has now moved on to deploy machine learning, artificial intelligence and IoT technology to make even more of the data and insights it generates. And ultimately get one step closer to making the world less polluted and decarbonized.

Read More…

EDP: powering the global energy transition using Microsoft Intelligent Data Platform, AI and IoT technology Read More »

ZBook Firefly G10


Need versatility in your PC fleet? Watch this enlightening video about the HP ZBook Firefly G10, that fits the needs of your entire workforce. Powered by the 13th Gen Intel Core processor, it also features the NVIDIA RTX A500 laptop GPU for fast-loading graphics and protection from HP Wolf Security.

ZBook Firefly G10 Read More »

Storm 0324 1024x683 1

Malware distributor Storm-0324 facilitates ransomware access

Are you prepared for Storm-0324, an active cyber-crime group that infiltrates networks and acts as a distributor for other attack payloads, including ransomware and infostealer payloads.

Beginning in July 2023, Storm-0324 was observed distributing payloads using an open-source tool to send phishing lures through Microsoft Teams chats.

Because Storm-0324 hands off access to other threat actors, identifying and remediating Storm-0324 activity can prevent more dangerous follow-on attacks like ransomware.

In this blog, we provide a comprehensive analysis of Storm-0324—a cyber-criminal group—and their established tools, tactics, and procedures (TTPs) as well as their more recent attacks.

To defend against this threat actor, Microsoft customers can use Microsoft 365 Defender to detect Storm-0324 activity and significantly limit the impact of these attacks on networks.

Read this Microsoft article to find out how to defend against this complex threat.

Read More…

Malware distributor Storm-0324 facilitates ransomware access Read More »

ElliQ by Intuition Robotics gains an extra layer of empathy with Azure Text to Speech

Discover the power of voice with “Intuition Robotics: Elevating Quality of Life with Azure Text-to-Speech.” Explore how this visionary AI company transformed elder care with Microsoft Azure Text-to-Speech. Learn how intuitive robot companions fueled by Azure’s lifelike synthetic voices, empowered seniors by enhancing communication and combating loneliness. By reading this inspiring customer story, gain insights into how you can harness the power of Azure’s cutting-edge technology in your own projects. Get the story and get ready to innovate. Contact us to how ORDINATEURS UNITECH COMPUTERS can help your company drive better outcomes with Azure text-to-speech applications and other AI services.

Read More…

ElliQ by Intuition Robotics gains an extra layer of empathy with Azure Text to Speech Read More »