This post will explain how to activate the FIDO2 authentication in your Azure AD and then how a user can register a key in his/her profile.
Generally, files attached to emails should be avoided for several reasons: Emails get heavier and some systems have size limitations You lose access to what is attached (with some exceptions, of course) Some systems might block specific extensions, and this is exactly what I am talking about But, since we […]
Here comes your security et al weekly digest! Issue number 12+1! In case you do not like the number 13. You will find SolarWinds hack, CTFs, and a 9.8 CVSS.
Here comes your security et al weekly digest! Issue number 12! Instagram account hacked, Adobe Flash, and Netgear all in the same post (but not the same news!)
Here comes your security et al weekly digest! Issue number 11! Microsoft, ransomware, breaches, and cars, all in the same post. Have a great week!
I am not the first one writing about red and blue teams. And I, for sure, will not be the last. Before going further, let me explain the reason for writing this post. The topic has been turning in my head for quite some time now. Still, I recently watched […]
Here comes your security et al weekly digest! Issue number 10! Zoom, state-sponsonred attacks, and lots more in this edition. Have a great week!
Sometimes management is not seeing how vital is a cybersecurity program. A penetration test might help you to make them understand.
Here comes your security et al weekly digest! Issue number 9! Have a great week!
Here comes your security et al weekly digest! Issue number 8! Have a great week!