Azure AD Management

Azure Active Directory Domain Services for Azure VMs Without DC

Azure Active Directory (Azure AD) Domain Services is a cloud-based service provided by Microsoft that enables you to provide domain services such as domain join, group policy, and LDAP to Azure VMs without the need for domain controllers. This article will guide you through the steps required to set up and use Azure AD Domain Services. Step 1: Create an Azure AD Domain Services…
Read more
Azure AD Security

How to Use Azure AD for LDAP Authentication

LDAP (Lightweight Directory Access Protocol) is a protocol used for accessing and managing directory information over an IP network. It is widely used in enterprise environments to authenticate users against a centralized directory service such as Active Directory. Azure Active Directory (Azure AD) is a cloud-based identity and access management service provided by Microsoft. It provides a…
Read more
Recent AD News

The United States and Singapore discuss cybersecurity cooperation.

The establishment of an annual discussion between Singapore and the United States was announced on Tuesday (Mar 29) as part of bolstering cybersecurity cooperation. Singapore Prime Minister Lee Hsien Loong is in the United States on a working visit. After attending a meeting in the White House, Singapore Prime Minister Lee Hsien Loong and US President Joe Biden released a joint…
Read more
Recent AD News

Ukrtelecom has been targeted by a "powerful" cyberattack

Ukrtelecom, Ukraine’s largest fixed-line telecommunications firm, has been targeted by a “powerful” cyberattack. It is considered to be the most lethal cyberattack since the Russian invasion began in February, and it has brought the company’s services across the country to a halt. Ukrtelecom CEO Yuriy Kurmaz said in a statement that a powerful hostile cyber attack was…
Read more
Recent AD News

Gartner warns Midsize Enterprise CIOs

According to Gartner, many of the security concerns that MSEs face are similar to those that larger enterprises face. The rising usage of cloud applications, open-source code, the internet of things (IoT), and cyber-physical systems, for example, has increased attack surfaces. As a result of this, MSE administrators will have to secure a more complicated organizational environment. The…
Read more
Recent AD News

Researchers have discovered a new phishing tactic

Passwords and other sensitive information can now be easily obtained using a variety of phishing methods. However, a new phishing tactic known as the BitB attack has recently been uncovered, and it is so perfectly crafted that most people would fall for it. This method entails creating a bogus pop-up login window that displays on a website. By combining HTML with CSS, threat actors create a…
Read more
Recent AD News

Lapsus$ hack confirmed by Microsoft; Bing & Cortana source codes stolen.

LAPSUS$, a data extortion hacking group that recently targeted Nvidia and Samsung, has stated that it has also targeted Microsoft, LG, and Okta. According to El Chapuzas Informatico, around 90 percent of the information from Bing Maps was stolen in the Microsoft hacks, while approximately 45 percent was obtained from Bing and Cortana. The extortion group released a torrent for a 9 GB zip file…
Read more
Recent AD News

Ukraine continues to battle DDOS attacks

Since the onset of the war on Feb. 24, the Ukraine government has tallied 3,000 DDOS strikes, including a one-day high of 275. The State Service of Special Communication and Information Protection of Ukrainesays: “Russia’s aggression, the intensity of cyberattacks against Ukraine’s vital information infrastructure hasn’t decreased. While Russian missiles are…
Read more
Recent AD News

Beware of this new phishing attack!

Phishing attacks have been an age-old cybersecurity problem, with threat actors sending out bulk emails in an attempt to trick users into sharing confidential data, fraudulent bank transactions, or entering their passwords via bogus login portals. Threat actors are exploiting email accounts by hijacking ongoing conversations between the users to send out phishing emails. This method is more…
Read more
Recent AD News

Vodafone attacked? Lapsus$ claims to have obtained access to over 200 GB of data.

Lapsus$, the infamous hacking group, claims to have acquired around 200 GB of source code files, which represents over 5,000 GitHub repositories. The Vodafone source code that the hackers claim to have obtained has not been leaked. Instead, they are asking thousands of users to join their Telegram channel. Vodafone Portugal blamed certain service outages on a “malicious hack” in…
Read more