Not Today, Satan: Securing Your Network by Blocking Ad-Borne Malware
Apart from being annoying, advertisements can actually be used to deliver malware. This blog explains what "Malvertising" is and how to secure your network from these attacks.
Apart from being annoying, advertisements can actually be used to deliver malware. This blog explains what "Malvertising" is and how to secure your network from these attacks.
In order to protect your Azure and Microsoft 365 services, you need to know what tokens are, where they come from, how they can be used, and how to protect them. This column by Paul Robichaux will hopefully get you pointed in the right direction.
Sometimes simulation testing is the best way to see how your org would react to threats, but at what cost? Check out this article, and see what testing would best fit your org.
Storm-0558 is a China-originated attack against sensitive Exchange Online mailboxes. The attack exposed several flaws in Microsoft's processing of data. Microsoft says that the holes are now closed, but it's still a good idea to check that your tenant is not being attacked in the same way.
What would happen to your organization if your top Admin disappeared? Well, it could be catastrophic... In this blog, Paul Robichaux discusses BRT attacks and how to prepare for them.
In this blog, Paul Robichaux covers a recent TEC Talk where he discusses AD-Based Attacks in 2023 and what we've learned so far.
Five years is way too long to leave a vulnerability unpatched. Unfortunately, forgetting to patch isn't uncommon and hackers love when you do... This blog discusses how to stay on top of patching and stop easily avoidable breaches.
Are you on watch for data breaches? This Blog talks about how soft skills, trainings, and investments can be used as tools to minimize the harm from data breaches.
Most of us don’t spend much time poking around in the unified audit log, but all of us probably should. In this article, we dive into 5 things you need to know about Microsoft 365 auditing.
Recently, security researchers at JumpSec labs identified a vulnerability in Teams that allows malware delivery through Teams chat. Microsoft Acknowledged the vulnerability but didn't release any immediate remedies. In this blog, we will discuss two practical methods to avoiding malware delivery within Teams.
You can’t disrupt a chain if you can’t identify the links. In this blog, Paul Robichaux goes over some of the ways you can break a Kill Chain in your environment. And it all starts with asking yourself the right questions.
Recycling is not only good for the planet, but it's also good for the security of your organization. In this article, Paul Robichaux discusses how to properly dispose of your devices so that you stay protected.