HOW TODAY’S CYBER CRIMINALS SNEAK INTO YOUR INBOX

“As organizations continue to move to cloud services, we see attackers going after cloud credentials,” Higbee says. “We are also seeing attackers use popular cloud services like SharePoint, OneDrive, Windows.net to host phishing kits. When the threat actor can obtain credentials, they are able to log into the hosted service as a legitimate user.”

SHAKE UP AT CAF IMMINENT AS NFF PRESIDENT LIKELY TO BECOME ACTING CAF PRESIDENT

“If the President ceases exercising his functions on a permanent basis the first Vice President shall assume the presidency, and shall be obliged to convene an Extraordinary General Assembly, in accordance with these Statutes.
The Extraordinary General Assembly shall elect a new President, within a period not exceeding four (4) months from the time the office of President becomes conclusively vacant.”