Recently, I encountered two distinct variants of a payload delivered through Google Drive, both containing a […]
Managing a SharePoint environment can be a complex task, especially when it comes to ensuring that […]
How to Guard Against Token Theft for Microsoft 365 Session hijacking occurs when an attacker steals […]
Recently, I found a security issue with the way IT-Boost handles TOTP secrets. IT-Boost can calculate […]
We've developed a C# Function App designed to balance devices from a main group into various Wave groups. This app can run on a recurring schedule, rebalancing devices as needed when there are changes in the number of devices due to growth or shrinkage.
Exciting news! 🎉 We’ve recently created this advanced CSS phishing protection, and we’re making it available […]
I’ve recently encountered an issue where malicious email was imported into the Zendesk platform, while it […]
This improved Sentinel Analytics Rule can be used to detect malicious Inbox Rules used by threat actors to hide invoice fraud activity. I've used the Inbox rule currently available as a template within Sentinel, and modified it to alert on Outlook rules I encountered in the wild.
A checklist to follow for Microsoft 365 accounts that are compromised
How do you ensure each endpoint is properly synced and redirected? What if important data is […]