
EchoLeak: First Known Zero-Click AI Attack Targets Microsoft Copilot
One email. No clicks. Full data breach. EchoLeak shows how AI assistants like Microsoft Copilot can become dangerous tools in the wrong hands.
One email. No clicks. Full data breach. EchoLeak shows how AI assistants like Microsoft Copilot can become dangerous tools in the wrong hands.
Our latest integration to join the Integration Hub is Microsoft Intune. With this simple feature you can now block elevations on devices that are not compliant with your existing Intune policies.
Initial infection via RDP, killing 39 processes, deleting event logs, then encryption - but all stages of the Venus ransomware attack can be prevented with the right tools.
Your users can now use Teams for more than just communication; they can approve or deny Requests for administrative access via a dedicated Teams channel.
You can now keep track of Events with our custom-built Power BI template - for customers who use data visualization as part of their business and security strategy.
Add another layer of enterprise security with our latest integration: send Auditlog data from your User Portal to your Microsoft Sentinel setup.
This blog by Simon Hartman Eriksen shares his experience with the LAPS-replacement feature - currently available on Windows andmacOS, and coming soon to Linux.
MS LAPS is a necessity and, like most necessities, only covers the bare minimum. That’s why we decided to take the necessary parts of LAPS and turn them into something much cooler. But hey - we’ll let you be the judge.
The new feature designed to eliminate the need for Microsoft LAPS.
Six options to deal with Microsoft’s PrintNightmare KB5005652.
BYOD is convenient, but risky. Discover 8 major security threats and how to protect sensitive data on employee-owned devices without hurting productivity.
One email. No clicks. Full data breach. EchoLeak shows how AI assistants like Microsoft Copilot can become dangerous tools in the wrong hands.
Your IT team isn't in control of everything. Learn how Shadow IT grows, the risks it creates, and what to do to protect your business.