boundbysec.bsky.social
@boundbysec.bsky.social
Reposted
Securing Microsoft Business Premium involves more than authentication. 🔑
Learn how Zero Trust & Conditional Access policies can protect your organization from risks.
www.chanceofsecurity.com/post/securin...

#MicrosoftSecurity #ZeroTrust #Authorization #ConditionalAccess #MSEntra #MSIntune
Securing Microsoft Business Premium Part 03: Authorization Best Practices from Zero Trust to Complete Access Control
In Part 02, we explored authentication, the process of verifying user identities—ensuring users are who they claim to be. Today we’ll build on that by diving into authorization—the process of determin...
www.chanceofsecurity.com
March 19, 2025 at 2:46 PM
Reposted
Sometimes, you want to run a few applications as a different (Admin) user on your system. In this small blog post, I will show you a simple way to start multiple applications using PowerShell, making life somewhat easier 😉

powershellisfun.com/2025/03/21/l...

#PowerShell #AppLauncher
PowerShell is fun :)Launching Start Menu apps using PowerShell
Sometimes, you want to run a few applications as a different (Admin) user on your system. Usually, I do that by (Shift) Right-clicking applications, etc… In this small blog post, I will show …
powershellisfun.com
March 21, 2025 at 7:48 PM
Reposted
Storm-2372 conducts a device code phishing campaign.

Update on Feb 14, 2025: 'Within the past 24 hours, MS has observed Storm-2372 shifting to using the specific client ID for MS AuthBroker in the device code sign-in flow. Read the full story below 👇

www.microsoft.com/en-us/securi...
Storm-2372 conducts device code phishing campaign | Microsoft Security Blog
Microsoft Threat Intelligence Center discovered an active and successful device code phishing campaign by a threat actor we track as Storm-2372. Our ongoing investigation indicates that this campaign ...
www.microsoft.com
February 17, 2025 at 7:07 AM
Reposted
Forgive your Entra ID admins, for they know not what they do. In most orgs, IAM is not owned by security. Therefore, security must inform IAM.

You MUST defend against modern cloud phishing techniques for INITIAL ACCCESS. Here are 4 of the top vectors when MFA is enforced:
February 10, 2025 at 12:51 PM