• Active Directory Flaws : Blank passwords

    Introduction Detecting tainted accounts in Active Directory (AD) that allow users to use a blank password is a significant security concern. This kind of configuration can severely compromise security by providing an easy entry point for unauthorized users in legacy systems ( Active directory). not needing a password to login. This is not a default…

  • Social Engineering & Phishing

    Introduction The transformation of the hacking landscape over the past decade is indeed profound. What started as a subculture dominated by enthusiasts and hobbyists—often portrayed in popular culture as individuals in Metallica t-shirts operating out of basements—has evolved into a highly sophisticated, global industry with significant financial and political implications. hackers Shift to Financial Gain…

  • Azure Dashboard: Malware & Phish Zap

    Introduction & Requirements Detecting phishing and malware incidents managed by Zero-hour Auto Purge (ZAP) to summarizing crucial event data for insightful analysis, we’ll explore a targeted KQL query designed to enhance your organization’s security posture. Whether you’re an IT professional, a security analyst, or just keen on cybersecurity practices, understanding how to utilize KQL for…

  • Released emails Azure Dashboard 365

    Introduction The dashboard plays a crucial role in bolstering email security by providing a comprehensive view of email-based threats and user interactions. This powerful tool allows security teams to enhance the organization’s overall security posture, respond effectively to incidents, and ensure alignment with compliance requirements. Dashboard Security Benefits: Compliance and Reporting: In essence, the dashboard…

  • Enhancing threat Detection with USB-Related Security Events with Sentinel

    USB-related security events can be particularly valuable for threat detection. For instance, Microsoft Defender for Endpoint can monitor and report on USB drive mount and unmount events, providing context such as drive letter, bus type, product name, serial number, and manufacturer. This data can be crucial in detecting and responding to incidents involving potentially malicious…