Microsoft 365 03 June 2022 How to Boss Device Management with Endpoint Manager (aka Intune) Read More
Compliance 26 May 2022 Use this Identity Checklist to secure your M365 tenant Securing a Microsoft 365 tenant starts with making sure you’re using strong authentication to identify… Read More
Press Releases 24 May 2022 Hornetsecurity acquires cybersecurity training experts, IT-Seal Hornetsecurity enhances its portfolio by acquiring cybersecurity training leader IT-Seal. Read More
Threat Reports 17 May 2022 Email Threat Review April 2022 In this installment of our monthly email threat review, we present an overview of the… Read More
Email Security 12 May 2022 RLO Technique: How Hackers Are Using a 20-year-Old Text Trick to Attack Microsoft 365 Users While Right-to-Left Override (RLO) attack is an old technique to trick users into executing a… Read More
Security Awareness Cyber Attack Wave to Fear: Vulnerability of Two-Factor Authentication (Part 1/2) Read More
Security Awareness 09 May 2022 Hacker Impersonates TrustWallet in Crypto Phishing Scam On June 12, a wave of more than 50,000 phishing emails sent from a malicious… Read More
Security Awareness 08 May 2022 Instagram Phishing Campaign: Hackers Exploit Social Verification A new Instagram phishing campaign has surfaced recently. First discovered in late July, the scam exploits… Read More
Email Whitelisting and the Risks of Automating Trust Email Security 12 May 2023 Email whitelisting is the process of adding an email address to your approved senders list.… Read more
”A wake-up call for businesses”: More than half of it departments saddled with burden of compliance, Hornetsecurity survey reveals Press Releases 20 June 2023 Nearly 4 in 5 organisations are more concerned about compliance than they were five years… Read more