If you’re going to be phished, you might as well be courted by some of Russia’s digital finest—at least that’s what a fresh report from Volexity would lead you to believe, as Ukraine-linked NGOs have found themselves starring in an unexpected cyber-espionage romcom, with the Russian hacking...
They say trust is the cornerstone of any relationship—especially if that relationship is between you, the internet, and a determined Russian adversary with a penchant for phishy invitations and suspicious requests for OAuth codes.
Phishing in the OAuth Era: New Tricks for Old Hackers
When we...
If you work for a U.S. government agency and you haven’t heard about CISA’s Binding Operational Directive 25-01, you might want to check your inbox, or possibly your junk folder—because ignoring this directive is about as hazardous to your career as leaving “12345” as your admin password...
auditing
bod 25-01
cisa
cloud compliance
cloud hardening
cloud security
cyber policy
cybersecurity
federal
google workspace
government security
iam security
it governance
microsoft 365
multi-factor authentication
remote work securitysaassecurity
scuba diving
security baseline
threat mitigation
To understand the state of EUC (end-user computing) security in 2025, you don’t need a crystal ball—just good shoes. At least, that’s the consensus after navigating the RSA Conference’s sprawling Moscone Center, where tracking down the future of endpoint and email security looks suspiciously...
A Closer Look at the Evolved Microsoft 365 Phishing Kit
Cybersecurity experts have recently raised the alarm on a significantly upgraded Microsoft 365 phishing kit that is raising the stakes in today's cybercrime landscape. The notorious Tycoon2FA platform, a phishing-as-a-service (PhaaS) tool...
Organizations are rapidly expanding their reliance on SaaS applications—and with growth comes complexity. In today’s digital ecosystem, where companies average 112 SaaS apps (and counting), even large-scale platforms like Microsoft 365 can mask an intricate web of over 1,000+ interconnections...
Auvik is stepping up its game once again, introducing a suite of new features aimed at streamlining SaaS management, enhancing network visibility, and revolutionizing server monitoring. For IT professionals, especially those managing Windows environments, these developments promise not only...
automation
auvik
cloud computing
endpoint monitoring
it management
managed services
network visibility
saassecurity
server monitoring
windows administration
windows it
Connecting managed service providers (MSPs) with streamlined, effective cloud security is more essential now than ever. ConnectWise has stepped into the spotlight with its latest announcement—ConnectWise SaaS Security—a solution meticulously designed to help MSPs deliver, manage, and monetize...
Microsoft has just confirmed that a security flaw in its Power Pages website-building platform was actively exploited—and while the vulnerability has now been patched, affected customers are urged to review and remediate their websites immediately. In today’s detailed breakdown, we dive into...
In recent international news, tensions in the Middle East have escalated dramatically. According to a live update from Al Jazeera on February 19, 2025, Israeli forces killed two individuals in Rafah, while talks for the second stage of a Gaza truce are underway. Even as these events unfold on...
Secure Your SaaS: Strategies to Protect Your Data in an Evolving Threat Landscape
In today’s digital business environment, software-as-a-service (SaaS) isn’t just a convenience—it’s the backbone of operations for countless organizations. With predictions stating that by 2025, 85% of business...
In a high-stakes move addressing the persistent risks of cybersecurity vulnerabilities across federal agencies, the Cybersecurity and Infrastructure Security Agency (CISA) has officially rolled out Binding Operational Directive (BOD) 25-01, titled “Implementing Secure Practices for Cloud...
bod 25-01
cisa
cloud security
cybersecurity
federal agencies
microsoft 365
regulatory compliance
saassecurity
scbs
scuba diving
security settings
windows users