Azure Active DirectoryAzure AD Security

Azure AD Identity Protection to detect and remediate identity risks

What is Azure AD Identity Protection? In today’s dynamic threat landscape, securing access to enterprise resources is crucial. An essential component of Microsoft Entra, Azure AD Identity Protection enables enterprises to proactively identify and address identity-related risks within their Azure Active Directory (Azure AD) environment. This comprehensive solution offers a layered approach…
Read more
Azure AD Management

Azure AD PIM: How to manage privileged access to resources

So, what is Azure AD Privileged Identity Management (PIM)? Users operating within a corporate network cannot be readily trusted with the entirety of an organization’s critical assets. For administrators to enforce crucial access management policies (such as monitoring of usage, limiting of permissions) when a client requests access to a resource for a stipulated amount of time, it is crucial…
Read more
Active Directory Fundamentals

Removing an Exchange Server Mailbox from your environment

An Exchange server is Microsoft’s on-premises mail and calendar offering that allows organizations to streamline effective communication amongst employees. You will be required to remove Exchange Server Mailbox for the below reasons: When an organization is updating their existing Exchange server with a new oneWhen the Exchange server is migrated from on-premises/hybrid to cloud…
Read more
Azure AD Best practicesAzure AD Fundamentals

Azure AD Connect: What it is, how it works; best practices

Despite the proliferation of cloud architecture, organizations cannot entirely shift from their existing on-premise environments due to the presence of important legacy solutions that do not support the migration. Besides, certain sensitive data and applications can only be locally hosted to avoid security and compliance issues. In such cases that involve a hybrid infrastructure, it can be…
Read more
Recent AD News

Chinese hacker group 'Naikon' strikes again: Targets ASEAN nations

According to researchers, the China-backed APT named Naikon (also known as ‘Override Panda’) has shown up again. The group masterminded a recent phishing campaign that was carried out to steal confidential information assets. Also known as Hellsing, and Bronze Geneva, Naikon is a known nation-state actor that has been working on behalf of China since 2005. The group was first…
Read more
Uncategorized

Report breaches to CERT-In within six hours: Indian government's order to organizations

On April 28, the Indian government’s Computer Emergency Response Team (CERT-In), the cyber response wing of Ministry of Electronics and IT (MeitY), issued a fresh order directing organizations (including service providers, intermediaries, data centers and corporate bodies) to report major security incidents, within six hours after notice. In a move to improve incident response, protect…
Read more
Recent AD News

Bumblebee: A new malware loader on the prowl

A latest report by Proofpoint has uncovered that attackers are using  a new malware loader named Bumblebee. These threat actors were previously known for delivering BazaLoader and IcedID loaders. According to the write-up, Bumblebee, a sophisticated malware loader, has been active in the cyberspace since March 2022, post the absence of BazaLoader. It must be noted that Bumblebee is capable of…
Read more
Recent AD News

FBI issues alert: A lethal ransomware that breached 60 companies

The FBI has issued a warning on the lethal Blackcat/ALPHV ransomware as a service (RaaS), which is currently on prowl. The malware family was responsible for compromising accounts spanning over sixty organizations, with attacks spanning from November 2021 till March this year. In their flash report, the FBI detailed the indicators of compromise (IOC) and tactics, techniques and procedures…
Read more
Recent AD News

Israel's Pegasus spyware finds a new target

A new report from Reuters suggests that EU officials were allegedly targeted by the NSO group’s Pegasus spyware. The report stated that atleast five individuals were spied upon by unknown entities using the infamous malware. In addition to two unnamed EU officials, the list of victims also include Didier Reynders,a senior Belgian official who has served as the European Justice…
Read more
Recent AD News

Researchers warn of two info-stealers on the prowl targeting users

With data breaches and information stealing becoming a prevalent sight in cyberspace, researchers have now warned the looming presence of two info-stealers, namely FFDroider and Lightning Stealer, which are capable of stealing sensitive information while launching further attacks. An official statement released by ZScaler based cybersecurity researchers Avinash Kumar and Niraj Shivtarkar…
Read more