Defend yourself against QR code phishing
In the ever-evolving landscape of email-based attacks, QR Code phishing has emerged as the stealthy ninja, silently infiltrating inboxes and bypassing ...
In the ever-evolving landscape of email-based attacks, QR Code phishing has emerged as the stealthy ninja, silently infiltrating inboxes and bypassing ...
Microsoft 365 native backup solution is almost here! Tons of documents and emails are added to Microsoft 365 every day. However, much ofβ¦
Microsoft is currently investigating an ongoing problem with Exchange Online that is causing disruptions for customers trying to send ...
Yet another bug in Microsoft Teams has emerged. Security experts have uncovered a straightforward method to distribute malware to an ...
You would not believe it! It happened. Azure AD can now back up and retrieve passwords from Windows LAPS. Bear in mind, that it is still in preview but man, I canβt wait ...
It's finally the time. To prevent multi-factor authentication (MFA) fatigue attacks, Microsoft has begun as previously announced implementing number matching in Microsoft Authenticator push ...
Microsoft has introduced a new feature that allows Windows administrators to receive email notifications when new issues are added to the Windows release health section of the Microsoft 365 ...
You want them, this is why In some of my posts, I mentioned something called Emergency access accounts. Emergency accounts are here to avoidβ¦
New conditional access control Still in preview, do not use in a production environment. On October 19, 2022, Microsoft announced newβ¦
In november 2022, many folks from the Microsoft community pointed out that a new setting was added to Azure AD ...
We use email communication on a daily basis. Since we use it daily to communicate with our customers, employees, and colleagues, we would think that the communication is secure and we can send anything we want ...
I had a presentation last week about identity and one of my topics was conditional access. I was describing basic vs. modern authentication and how conditional access is evaluated during modern authentication.
As a person interested in technology, I did want to develop my blog by myself. I wasnβt keen on building it with a fancy web-based editor ...
As I said in the last post, today's post is all about what you can expect from me and this blog. I'll mention what the content of this blog would look like and ...
Good morning, afternoon, or evening to whenever and wherever you are. My name is Martin Strnad, I'm a junior security systems engineer and this is a Hello World type of post. I live in ...