Microsoft’s latest announcement radically alters the cybersecurity landscape for small and medium businesses by unveiling Microsoft 365 E5 Security as a cost-effective add-on for Business Premium subscribers. From a high-level viewpoint, this move aims to bring enterprise-grade security...
ai in security
business premium
cloud security
cyber insurance
cyber threat protection
cybersecurity
defender for endpoint
defender for office 365
e5 security
endpoint security
extended detection and response
identity and access management
microsoft 365 e5
saassecuritysecurity automation
shadow it
small business security
smb security solutions
threat detection
xdr
Russian threat actors have once again raised the bar for cyber espionage, turning attention toward OAuth 2.0 authentication flows in Microsoft 365, hijacking accounts connected to Ukraine and human rights organizations. Their tactics, as uncovered by cybersecurity firm Volexity, fit into a...
Russian hackers have figured out a way to weaponize OAuth 2.0 authentication—yes, that protocol you trusted implicitly last Tuesday when you breezed through another Microsoft 365 login screen—turning what should be a knight in shining armor into a digital Trojan horse galloping straight through...
If you’re going to be phished, you might as well be courted by some of Russia’s digital finest—at least that’s what a fresh report from Volexity would lead you to believe, as Ukraine-linked NGOs have found themselves starring in an unexpected cyber-espionage romcom, with the Russian hacking...
They say trust is the cornerstone of any relationship—especially if that relationship is between you, the internet, and a determined Russian adversary with a penchant for phishy invitations and suspicious requests for OAuth codes.
Phishing in the OAuth Era: New Tricks for Old Hackers
When we...
If you work for a U.S. government agency and you haven’t heard about CISA’s Binding Operational Directive 25-01, you might want to check your inbox, or possibly your junk folder—because ignoring this directive is about as hazardous to your career as leaving “12345” as your admin password...
audit & assessment
bod 25-01
cisa
cloud compliance
cloud hardening
cloud security
cyber policy
cybersecurity
federal it
google workspace
government security
iam security
it governance
microsoft 365
multi-factor authentication
remote work securitysaassecurity
scuba project
security baselines
threat mitigation
To understand the state of EUC (end-user computing) security in 2025, you don’t need a crystal ball—just good shoes. At least, that’s the consensus after navigating the RSA Conference’s sprawling Moscone Center, where tracking down the future of endpoint and email security looks suspiciously...
Organizations are rapidly expanding their reliance on SaaS applications—and with growth comes complexity. In today’s digital ecosystem, where companies average 112 SaaS apps (and counting), even large-scale platforms like Microsoft 365 can mask an intricate web of over 1,000+ interconnections...
Connecting managed service providers (MSPs) with streamlined, effective cloud security is more essential now than ever. ConnectWise has stepped into the spotlight with its latest announcement—ConnectWise SaaS Security—a solution meticulously designed to help MSPs deliver, manage, and monetize...
Microsoft has just confirmed that a security flaw in its Power Pages website-building platform was actively exploited—and while the vulnerability has now been patched, affected customers are urged to review and remediate their websites immediately. In today’s detailed breakdown, we dive into...
In recent international news, tensions in the Middle East have escalated dramatically. According to a live update from Al Jazeera on February 19, 2025, Israeli forces killed two individuals in Rafah, while talks for the second stage of a Gaza truce are underway. Even as these events unfold on...
Secure Your SaaS: Strategies to Protect Your Data in an Evolving Threat Landscape
In today’s digital business environment, software-as-a-service (SaaS) isn’t just a convenience—it’s the backbone of operations for countless organizations. With predictions stating that by 2025, 85% of business...
In a high-stakes move addressing the persistent risks of cybersecurity vulnerabilities across federal agencies, the Cybersecurity and Infrastructure Security Agency (CISA) has officially rolled out Binding Operational Directive (BOD) 25-01, titled “Implementing Secure Practices for Cloud...