Hacking doesn’t always need to be done with a computer, it can be done with words.
An introduction to Single Sign-On, SAML and MFA.
A ‘short’ list of Acronyms I have come across since working in IT. This isnt a full list but I will be sure to add
Read about what steps to take when an Office365 account has been compromised.
Secure your mobile devices with a combination of MDM, MAM and MTD.
Sophos Cloud Optix provides the next step that takes DevOps to DevSecOps, and provides valuable insights of resources that are compliant.
Get visibility and intelligence to how well configured your cloud resources are with Sophos Cloud Optix!
Hello Readers! I have decided to jump on the band wagon and write a quick article that summarises the recent RDP Vulnerability that has been
In this article I am going to talk about some of the Tactics and Tools that attackers can use when they have intruded into your
Common User Password Profiler, also known as CUPP is a very useful tool on Kali. Essentially, it is a python script, capable of generating targeted wordlists