Microsoft Expands Free Logging Capabilities for all U.S. Federal Agencies

February 24, 2024 at 07:21AM Microsoft has expanded free logging capabilities to all U.S. federal agencies, using Microsoft Purview Audit, regardless of licensing. This comes after a China-linked cyber espionage campaign targeting organizations. The move includes automatically enabling logs in customer accounts and increasing log retention to 180 days, aiding federal agencies to meet logging … Read more

VMware Alert: Uninstall EAP Now – Critical Flaw Puts Active Directory at Risk

February 21, 2024 at 01:15AM VMware has reported critical security flaws in the Enhanced Authentication Plugin (EAP), urging users to uninstall it. The vulnerability enables a malicious actor to manipulate service tickets and hijack sessions. Additionally, SonarSource disclosed cross-site scripting flaws in Joomla!. Salesforce’s Apex programming language also faces high-severity vulnerabilities. Users are advised to … Read more

Protect your Active Directory from these Password-based Vulnerabilities

December 14, 2023 at 11:25AM Active Directory (AD) is a prime target for threat actors due to its role in identity management. Vulnerabilities like Kerberoasting, password spraying, default credentials, and privilege escalation pose significant risks. Specops Password Policy and Specops Password Auditor offer solutions to safeguard against these threats, through strong password enforcement and breach … Read more

How to boost Security with Self-Service Password Resets

November 20, 2023 at 10:47AM Allowing users to reset their own passwords offers multiple benefits, including saving time and money for IT departments, reducing the risk of social engineering attacks, and empowering end-users. One solution is using Microsoft’s Self-Service Password Reset functionality with Azure AD Connect. Another option is Specops uReset, which integrates with Active … Read more

Ransomware Readiness Assessments: One Size Doesn’t Fit All

November 3, 2023 at 10:07AM Ransomware attacks can have devastating effects on organizations, so it’s crucial to have a tailored ransomware response plan. The impact and severity of an attack can vary, so it’s important to assess readiness based on different scenarios. Workshops on containment measures, backup systems, critical applications, network architecture, coordination processes, and … Read more