Analysis of Storm-0558 techniques for unauthorized email access

Hello folks. A Microsoft cybersecurity report explains techniques used for the malicious campaign Storm-0558. Here you have more details: https://www.microsoft.com/en-us/security/blog/2023/07/14/analysis-of-storm-0558-techniques-for-unauthorized-email-access/ Source: Microsoft https://www.microsoft.com/en-us/security/blog/author/microsoft-security-threat-intelligence/ Cheers.

A great tool to check your email security

Hello Lads. I am sharing a great security tool to check your health in your email environment. This tool is provided by the National Cyber Security Centre based in the UK; the goal is only to put your domain. The tool checks SPF, DMARK, DKIM, and TLS. To verify DKIM, you need to write an …
Continue reading A great tool to check your email security

AWS–Security Best Practices IAM

Hello Folks, a few times, we had situations where looking for best practices in IAM for a particular project based in AWS. Here I share an exciting URL with best practices to apply on AWS for IAM; I hope this helps you to deploy Identity Security policies and strategies. https://docs.aws.amazon.com/IAM/latest/UserGuide/best-practices.html?secd_iam7 Peter Diaz

Microsoft GitHub–Azure Sentinel repository.

Hello Folks, here is the most exciting repository to work with Azure Sentinel. When you need a script, workbook, parsers, notebooks, or a simple example of how to do automation, go to this site. https://github.com/Azure/Azure-Sentinel If you have the information, you have the power. Peter Diaz

Microsoft Ninja Training are available.

Hello Lads, Microsoft is launching a series of ninja training highly recommended; please feel free to share it with your cybersecurity network. All training is free. Ninja Training Microsoft Sentinel Microsoft Defender for Cloud Azure Network Security Microsoft Defender Threat Intelligence Microsoft Defender for IoT Microsoft Defender for Cloud Apps Peter Diaz.