Active Directory (AD) objects are rarely managed as standalone entities. In Part 3 of this series, we covered practical exercises for creating and managing two of...
NOBELIUM’s phishing attacks: How to protect your Microsoft 365 setup [E-book]
In 2021, the Microsoft Threat Intelligence Center discovered a new malicious email campaign by NOBELIUM, a group of hackers that has carried out nation-state attacks, and...
Protecting your Microsoft 365 services against NOBELIUM attacks [E-book]
In December 2020, Microsoft came forward with details regarding what is now being considered the most extensive, severe cyberattack in history—the NOBELIUM attack. This shocking...
The handbook that every cybersecurity analyst needs [E-book]
The IT industry recognizes the drastic increase in cyberattacks in the past few years. With cybercriminals constantly evolving their attack tactics, IT security professionals need...
4 golden reasons for equipping your SOC with ManageEngine Log360
Cyberattacks are fast becoming a part of our daily lives. Multiple sources such as Norton Security and Forbes suggest that since the pandemic, attacks are not only...
Anomaly Detection In Cybersecurity For Dummies [E-book]
If you are a cybersecurity professional, you must be aware that cyberattacks, especially those that arise from insider threats, are increasing every day. Multiple sources suggest...