8 Aprile 2025
The transformative impact of AI and generative AI on OSS and BSS in telecommunications

As telecommunications operators grapple with exponential growth in data usage and the demands of modern consumers, the role of operations support systems (OSS) and business support systems (BSS) is being reimagined to address these pressures. Once defined by siloed architectures and manual processes, core systems are now evolving[…]

Read More
7 Aprile 2025
Tech Accelerator: Azure security and AI adoption

Are you looking for guidance on how to effectively integrate security best practices within your Azure and AI projects? We know the pace of technological innovation offers as many opportunities as it does challenges. However, security cannot be an afterthought as you create Azure deployments and accelerate AI[…]

Read More
3 Aprile 2025
Threat actors leverage tax season to deploy tax-themed phishing campaigns

As Tax Day approaches in the United States on April 15, Microsoft has observed several phishing campaigns using tax-related themes for social engineering to steal credentials and deploy malware. These campaigns notably use redirection methods such as URL shorteners and QR codes contained in malicious attachments and abuse[…]

Read More
3 Aprile 2025
Threat actors leverage tax season to deploy tax-themed phishing campaigns

As Tax Day approaches in the United States on April 15, Microsoft has observed several phishing campaigns using tax-related themes for social engineering to steal credentials and deploy malware. These campaigns notably use redirection methods such as URL shorteners and QR codes contained in malicious attachments and abuse[…]

Read More
3 Aprile 2025
Threat actors leverage tax season to deploy tax-themed phishing campaigns

As Tax Day approaches in the United States on April 15, Microsoft has observed several phishing campaigns using tax-related themes for social engineering to steal credentials and deploy malware. These campaigns notably use redirection methods such as URL shorteners and QR codes contained in malicious attachments and abuse[…]

Read More