Microsoft 365

Microsoft Office apps are vulnerable to IDN homograph attacks
Microsoft Office apps – including Outlook – are vulnerable to homograph attacks based on internationalized domain names (IDNs). In practice, this means that users …

DTEX Systems extends scope and protection of Microsoft 365 E5 modules
DTEX Systems announced new capabilities within its DTEX InTERCEPT for Behavioral DLP solution that expand the scope and protection provided by multiple Microsoft 365 E5 …

Veeam Backup for Microsoft 365 v6 boosts customers’ data resilience and mitigates SaaS data risks
Veeam Software released the latest version of the company’s fastest growing Software as a Service (SaaS) product — Veeam Backup for Microsoft 365 v6. The backup and recovery …

AvePoint Ransomware Detection identifies suspicious behavior within users’ Microsoft OneDrive
AvePoint launched Ransomware Detection, as part of Cloud Backup for Microsoft 365, to further protect digital collaboration data. This new capability proactively detects …

Attackers use Microsoft Teams as launchpad for malware
Hackers are starting to realize that Microsoft Teams is a great means of spreading tentacles throughout an organization’s systems; since the start of the year, Avanan …

Microsoft: Enterprise MFA adoption still low
While two-factor authentication usage in the consumer space is climbing quickly, enterprises are still straggling when it comes to using multi-factor authentication (MFA) to …

Organizations neglecting Microsoft 365 cybersecurity features
Nearly half of organizations are not using the full set of features and applications available in Microsoft 365, a research from Ensono reveals. Most notably, many enterprises …

Cloudflare joins Microsoft 365 Networking Partner Program to optimize user connectivity
Cloudflare announced it has joined the Microsoft 365 Networking Partner Program (NPP). Customers of Cloudflare’s Zero Trust platform, Cloudflare One, will now benefit from …

Microsoft launches Privacy Management for Microsoft 365
Microsoft has made available Privacy Management for Microsoft 365, a new AI-based solution to help enterprises manage data privacy risks and build a privacy resilient …

BitTitan Migration Discovery Solution offers tenant-to-tenant migration assessments for MSPs
BitTitan launched its comprehensive Migration Discovery Solution that allows IT service professionals and managed service providers (MSPs) to conduct detailed, non-invasive …

Datto SaaS Defense protects cloud-based applications for MSPs
Following its acquisition of Israel-based cyber threat detection company BitDam earlier this year, Datto debuted its SaaS Defense security product built exclusively for MSPs. …
Fletch releases two security offerings to help organizations stay ahead of cybercriminals
Fletch launched their first two offerings that continuously analyzes trending threats and insider risk, free of charge. For the past two and half years, Fletch has …
Featured news
Resources
Don't miss
- Mastering the cybersecurity tightrope of protection, detection, and response
- PRevent: Open-source tool to detect malicious code in pull requests
- Darcula allows tech-illiterate crooks to create, deploy DIY phishing kits targeting any brand
- Hackers pose as employers to steal crypto, login credentials
- Unknown and unsecured: The risks of poor asset visibility