ADSelfService Plus | April 24, 2024Combating phishing attacks with passwordless FIDO2 authentication Attackers predominantly use phishing attacks to steal and misuse user identities. A...
M365 Manager Plus | March 4, 2024Why you should be concerned about the largest phishing attack on Azure so far, and what you can do about it Azure customers are facing the biggest threat to their privileged accounts. A...
General | November 8, 2021NOBELIUM cyberattacks revived: What you need to know now [Free e-book] The Microsoft Threat Intelligence Center (MSTIC) has detected that NOBELIUM, the threat...
M365 Manager Plus | October 6, 2021[Free e-book] How to protect Microsoft 365 from the NOBELIUM hackers' phishing attack NOBELIUM is the group behind the SUNBURST backdoor, TEARDROP malware, GoldMax malware,...
IT Security | May 14, 2020Email, security, and breaches Email-based attacks can take many forms, and are typically deployed by cybercriminals in...
Endpoint Central | October 24, 2017Keeping your end users safe from the latest Facebook phishing attack After the WannaCry and Petya attacks earlier this year, ransomware and malware attacks...