Home » LATEST » Page 16
Iran-aligned phishing campaign targeting US policy experts via prefilled Microsoft 365 portals and RMM persistence

Iran-Linked Phishing Hits US Policy Experts with M365 and RMM

Iran-aligned operators ran a precise phishing campaign against US policy experts. They impersonated scholars, redirected victims to prefilled Microsoft 365 pages, and, when blocked, installed remote-access tools. The goal: long-term visibility into policy drafts, research, and contacts—achieved through identity abuse, inbox rules, and pragmatic persistence.

Read More
Login screen for a video management system showing strong password rules and MFA prompt, with blurred camera tiles in the background

Louvre Password Heist: Weak Credentials, Wide Open Risk

A trivial surveillance password created an opening at one of the world’s most prominent institutions. Intruders gained awareness and timed their move because credential policy failed. This analysis delivers the signals, mitigations, and governance disciplines that stop repeats: rotation, MFA, segmentation, PAM for service accounts, and continuous validation for VMS and NVR stacks—without resorting to list spam or generic advice.

Read More
A conceptual image of a Microsoft 365 firewall blocking a malicious red email representing a BEC attack, while allowing safe emails to pass through, symbolizing effective security rules

Block BEC: 9 Microsoft 365 Rules That Actually Work

Business email compromise drains budgets with executive spoofing and invoice fraud. This practical Microsoft 365 guide shows nine rules that actually stop BEC: tuned anti-phish and impersonation, Safe Links and Safe Attachments, SPF/DKIM/DMARC, phishing-resistant MFA with Conditional Access, external sender tags, mailbox hygiene, attack simulation, and a short incident playbook.

Read More