Our recommendations for setting up the Entra ID tenant, conditional access policies, what to monitor, and with which tools to audit Entra ID.
After a successful phishing attempt, attackers aim to elevate their privileges and maintain access to the compromised Entra ID environment for as long as possible.
Technical training on how attackers gain access to Office 365 / Microsoft Entra ID.
I want to strengthen the security level of our environment, and I think that AAD can help us with that for the following reasons.
What is EDR? What does it offer? Why do I think it is great technology for any company dealing with IT security.
Four frequent and unrealistic expectations from SIEM and sandbox I often encounter.
Last week, hackers managed to break in and encrypt one server of our customer 😤.
In other words, why employee training is not what most companies need.
Tips for starting a career in cybersecurity. Distilled experiences of my friends and me. Courses, websites, certifications, duration.
Data leak? After a hacker attack, companies usually ensure the public that no personal data has been leaked. But, how do they know it?
Business E-mail Compromise cyber attacks type Counterfeiting emails, identity theft aimed at making money. How do the BEC attacks work?
How to use publicly available information and find a security flaw in the network? OSINT method and Vltava Basin hack case study.
Wondering how to increase RDP (remote desktop) security? Let me tell you how hackers most often hack RDPs and why VPN won't change anything about it.
No matter how much you invest in IT security if your provider messes around. Beware of hacker attacks through providers.
Ransomware actors have a new trick. None of backup solutions can mitigate it. They are threatening to release all the stolen information.
Companies end up without data or backups after a ransomware attack because they underestimate the skills of hackers. Learn what a hacker can do within your network and how to improve security.
Did you tape your webcam because you're afraid of hackers? The video shows how easy it is to hack a laptop webcam. Do you know how to defend getting hacked?
We have made one Linux virtual server available for you to hack from the comfort of your home just after the HackerFest 2019. Go on!
Over 60 servers hacked, 5 months of life and 1 exam. My path to OSCP certification: Offensive Security Certified Professional.
Compromised computer or stolen data? Watch a video on how to get hacked by a RDP server. And then read how to defend against this attack.