An adversary-in-the-middle attack (formerly Man-in-the-middle, sometimes now referred to as Attacker-in-the-middle) is a type of…
Malicious OAuth apps are an issue that has plagued M365 for many years. By default,…
Nearly 60% of companies are ‘very’ to ‘extremely’ concerned about ransomware attacks, according to latest…
The Monthly Threat Report by Hornetsecurity brings you monthly insights into M365 security trends, email-based…
You can’t be in the IT security space without thinking about certifications. Certifications are the…
It’s Monday morning; you have a fresh cup of coffee in hand and are ready…