https://hardenedlinux.org/blog/2026-04-13-stealthy-rce-on-hardened-linux-noexec--userland-execution-poc/ #hackernews #bypass #sysadmins #defenseindepth #HackerNews #ngated
What is Port Knocking Implementation and Security: A Comprehensive Guide
https://denizhalil.com/2026/04/06/port-knocking-implementation-security-guide
#CyberSecurity #PortKnocking #NetworkSecurity #DefenseInDepth #LinuxSecurity #ServerSecurity

Learn everything about port knocking implementation, security risks, attack and defense strategies, and best practices. This comprehensive guide covers how port knocking protects your network and how to deploy it securely against modern threats.
This Punchbowl Phish Is Bypassing 90% Of Email Filters Right Now
997 words, 5 minutes read time.
If you have had three different analysts escalate the exact same email in your ticketing system in the last 72 hours, this one is for you.
This is not a Nigerian prince scam. This is not a fake Amazon order. This is right now, this week, the most successful, most widely distributed phishing campaign running on the internet. And almost nobody is talking about just how good it is.
What this scam actually is
You get an email. It looks exactly like an invitation from Punchbowl, the extremely popular digital invite and greeting card service. Thereâs no misspelled logo. Thereâs no broken grammar. There is absolutely nothing that jumps out as fake.
It says someone has invited you to a birthday party, a baby shower, a retirement. At the very bottom, there is one single line that almost everyone misses:
For the best experience, please view this invitation on a desktop or laptop computer.
If you click the link, you do not get an invitation. You get malware. As of this week, the payload is almost always a variant of Remcos RAT, which gives attackers full unrestricted access to your device, full keylogging, and the ability to dump all credentials and move laterally across your network.
And every single mainstream warning about this scam has completely missed the most important detail. That line about the desktop? That is not a throwaway line. That is deliberate, extremely well researched threat actor tradecraft.
Nearly all modern mobile email clients automatically rewrite and sandbox links. Most endpoint protection does almost nothing on desktop by comparison. The attackers know this. They are actively telling you to defeat your own security for them. And it works.
Why this is an absolute nightmare for security teams
Let me give you the numbers that no one is putting in the official advisories:
I have seen CISOs, SOC managers and professional penetration testers all admit publicly this week that they almost clicked this link. If you look at this and donât feel even the tiniest urge to click, you are lying to yourself.
This is what good phishing looks like. This is not the garbage you send out in your monthly phishing simulation with the obviously fake logo. This is the stuff that actually works.
How to not get burned
Iâm going to split this into two sections: the advice for end users, and the actionable stuff you can implement as a security professional in the next 10 minutes.
For everyone
@punchbowl.com. There are no exceptions. If it comes from anywhere else, delete it immediately.For SOC Analysts and Security Teams
These are the steps you can go and implement right now before you finish reading this post:
for the best experience please view this on a desktop or laptop. At time of writing this rule has a 0% false positive rate.Closing Thought
The worst part about this scam is how predictable it is. We have all been talking for 15 years about how the next big phish wonât have spelling mistakes. We all said it will look perfect. It will be something you actually expect. And now itâs here, and it is running circles around almost every security stack we have built.
If you see this email, report it. If you are on shift right now, go push that detection rule. And for the love of god, stop laughing at people who almost clicked it.
Call to Action
If this breakdown helped you think a little clearer about the threats out there, donât just click away. Subscribe for more no-nonsense security insights, drop a comment with your thoughts or questions, or reach out if thereâs a topic you want me to tackle next. Stay sharp out there.
D. Bryan King
Sources
Disclaimer:
The views and opinions expressed in this post are solely those of the author. The information provided is based on personal research, experience, and understanding of the subject matter at the time of writing. Readers should consult relevant experts or authorities for specific guidance related to their unique situations.
#attackVector #boardroomRisk #breachPrevention #CISAAlert #CISO #credentialTheft #cyberResilience #cyberattack #cybercrime #cybersecurityAwareness #defenseInDepth #desktopOnlyPhishing #detectionRule #DKIM #DMARC #emailFilterBypass #emailGateway #emailHygiene #emailSecurity #emailSecurityGateway #endpointProtection #incidentResponse #indicatorsOfCompromise #initialAccess #IoCs #lateralMovement #linkSafety #logAnalysis #maliciousLink #malware #MITREATTCK #mobileEmailRisk #phishingCampaign #phishingDetection #phishingScam #phishingSimulation #phishingStatistics #PunchbowlPhishing #ransomwarePrecursor #RemcosRAT #sandboxEvasion #securityAlert #SecurityAwarenessTraining #securityBestPractices #securityLeadership #securityMonitoring #securityOperationsCenter #securityStack #SOCAnalyst #socialEngineering #spearPhishing #SPF #suspiciousEmail #T1566001 #threatActor #threatHunting #threatIntelligence #userTraining #zeroTrustSecurity tools that live outside the operating system can only react. The most effective defenses are the ones built into the OS itself: enforcing integrity, catching tampering, and reducing blast radius in real time.
Prevention beats cleanup. Every time.
#LinuxSecurity #EnterpriseLinux #Linux #SysAdmin #DefenseInDepth
Windows 11 Patch Fallout: When Micro$lop Tells You to Uninstall a Security Update
2,128 words, 11 minutes read time.
Micro$lop has issued an unprecedented recommendation for Windows 11 users: uninstall the KB5074109 update. The announcement alone was enough to make IT and security teams sit up straight, because itâs almost unheard of for the vendor to tell organizations to roll back a security patch. Released in January 2026, the update was intended to fix several critical vulnerabilities and enhance overall system stability. Instead, it caused immediate operational disruptions that caught enterprises off guard, turning what should have been routine patching into a high-pressure crisis.
End users began reporting a cascade of issues almost immediately. Outlook crashes became common, with POP and PST profiles hanging indefinitely, black screens appeared during shutdowns, and Remote Desktop sessions failed without warning. Teams relying on remote access suddenly found themselves cut off from critical systems, while internal applications that integrated with Windows components started behaving unpredictably. The disruption extended across both desktops and servers, making it clear that this was not a minor glitch but a systemic problem that could affect productivity and business continuity.
For organizations, the fallout created a brutal operational and security dilemma. Leaving the patch installed meant dealing with constant system failures, frustrated users, and potential data loss. Rolling it back, however, reopened critical security holes and exposed endpoints to known vulnerabilities, leaving them theoretically vulnerable to cyberattacks. This rare advisory illustrates the complexity of enterprise patch management, highlighting how even a trusted vendor update can force security teams into high-stakes decision-making that balances operational continuity, threat modeling, and risk management under pressure.
Patch KB5074109: Why Security Teams Are Concerned
KB5074109 was designed to fix security flaws and enhance system stability, yet it introduced critical failures immediately after deployment. Outlook POP and PST profiles hung completely, third-party applications malfunctioned, and Remote Desktop services became unreliable. Emergency fixes were issued by Micro$lop, but some issues persisted, forcing teams to act quickly to avoid widespread operational disruption. The situation illustrates how even trusted updates can inadvertently compromise productivity while attempting to enhance security.
The Risks of Uninstalling Security Updates
Security best practices have always emphasized the importance of applying patches promptly. Every unpatched system is an open invitation for attackers, and modern defense-in-depth strategies rely on layers of mitigation, with patches forming one of the most critical layers. A security update isnât just a line in a change logâitâs a shield designed to close known vulnerabilities before adversaries can exploit them. From a theoretical standpoint, skipping or rolling back a patch is considered a serious risk, because every CVE left unpatched represents a potential foothold for threat actors.
Yet the KB5074109 scenario demonstrates that the real world doesnât always align with theoretical best practices. When a patch itself begins breaking core business applications, freezing critical services, or causing unexpected downtime, the operational impact can suddenly outweigh the immediate benefits of security. Organizations are forced into a high-stakes calculation: leaving the patch in place risks productivity, user frustration, and potential financial loss, while rolling it back leaves endpoints exposed to known vulnerabilities. This is the kind of challenge that turns routine patching into a high-pressure risk management problem.
In these situations, effective threat modeling becomes essential. Security teams must identify which CVEs remain unpatched, understand which systems are most exposed, and determine what compensating controlsâsuch as enhanced endpoint detection, network segmentation, or temporary access restrictionsâcan reduce risk. High-value systems, like those handling sensitive data or critical business operations, demand particular attention during a rollback. The balance between operational stability and security protection isnât easy, but teams that think strategically and act deliberately are able to navigate this paradox without falling victim to either disruption or compromise.
Incident Response for Faulty Windows 11 Patches
Treating a problematic patch as a formal incident is essential, because the operational fallout can be just as dangerous as a security breach. When KB5074109 began causing crashes and black screens, IT and security teams were effectively thrust into emergency mode. Viewing the patch failure through the same lens as a malware outbreak or ransomware attack ensures that the response is structured, systematic, and focused on minimizing both operational disruption and security exposure. Itâs no longer just a matter of uninstalling softwareâevery step must be planned and executed with precision, with roles and responsibilities clearly assigned.
Monitoring telemetry becomes the first line of defense in this scenario. Failed logins, abnormal system behavior, crashes, and endpoint anomalies are early warning signs that indicate how widespread the issue is and which systems are most at risk. Teams that rely on centralized monitoring tools, such as SCCM, Intune, or advanced EDR dashboards, are able to map the impact quickly, triage the most critical failures, and prioritize response actions. Real-time visibility is invaluable, because the faster a team can understand the scope of the problem, the more effectively they can mitigate both operational and security risks.
Phased rollbacks, careful documentation, and transparent communication with leadership are the operational backbone of managing a patch incident. Rolling back a few pilot systems first allows teams to assess whether the rollback restores stability without introducing additional problems. Documentation ensures that every step is auditable and lessons are captured for future incidents, while leadership communication keeps stakeholders informed and sets expectations around downtime, risk exposure, and temporary mitigations. Complementary controls such as enhanced endpoint detection, network segmentation, and restricted access to sensitive resources help reduce exposure during the rollback period, allowing organizations to maintain both security hygiene and operational continuity.
Patch Management Strategy: Best Practices for Enterprise Security
Not all systems carry the same level of risk, and understanding that distinction is critical when deploying patches like KB5074109. Endpoints supporting critical applications, sensitive data repositories, or remote-access services represent high-value targets for attackers and high-impact points of failure for business operations. Treating every system identically during a rollout can amplify disruption and expose organizations to avoidable risk. Prioritizing deployments based on criticality, dependency, and threat exposure ensures that operational continuity is preserved while high-value systems receive the focused attention they require.
Phased rollouts provide an essential buffer against widespread failure. By deploying updates incrementallyâstarting with a small pilot group or non-critical endpointsâteams can observe how systems react, detect unexpected failures, and refine deployment procedures before the update reaches the broader enterprise. This approach allows IT and security teams to catch compatibility issues, application crashes, and endpoint anomalies early, minimizing the likelihood of mass disruptions. Telemetry and monitoring feed directly into this phased approach, supplying real-time data on system health, performance degradation, and user-impact metrics that inform immediate corrective action.
Equally important is maintaining robust rollback procedures and structured feedback channels with Micro$lop. When a patch introduces instability, clear rollback protocols enable teams to restore affected systems efficiently, while structured reporting ensures that the vendor is aware of critical failures and can prioritize fixes in future updates. The KB5074109 incident highlights a larger lesson for enterprise security: planning for unexpected failures is not optional. Teams must balance operational continuity with cybersecurity hygiene, relying on careful monitoring, strategic prioritization, and proactive communication to navigate the inherent risks of patch management.
Threat Modeling and Compensating Controls
When a security update fails, threat modeling becomes the guiding framework for making informed decisions under pressure. Not every vulnerability exposed by a rollback carries the same level of risk, and understanding which weaknesses an attacker could realistically exploit is essential. High-value systems, sensitive databases, and critical services require immediate attention, while less critical endpoints may tolerate temporary exposure. Effective threat modeling allows security teams to prioritize actions, allocate resources efficiently, and focus mitigations where they matter most, rather than reacting blindly to every potential CVE.
Organizations can implement a variety of compensating controls while waiting for a stable patch release. Endpoint protection tools can be fine-tuned to catch exploit attempts targeting newly exposed vulnerabilities, while network segmentation limits lateral movement in the event of a breach. Access to sensitive systems can be restricted or elevated monitoring applied to critical workflows, giving teams additional time to assess risk without halting business operations. By layering these controls strategically, organizations reduce the window of exposure and maintain a defensive posture even in the absence of the intended patch.
These measures demonstrate that operational resilience is just as important as the patch itself. Applying an update is only one layer of a broader defense-in-depth strategy, and failures in deployment expose the limitations of relying solely on vendor releases. Security teams that combine threat modeling, compensating controls, and real-time monitoring are better equipped to navigate the paradox of maintaining security while mitigating disruption. The KB5074109 incident serves as a clear reminder that thoughtful planning, proactive risk assessment, and agile operational response are as critical to enterprise security as any patch.
Lessons Learned from KB5074109
KB5074109 serves as a stark case study in the complexity of patch management for modern enterprise environments. Applying updates is rarely as simple as clicking âinstall.â Enterprise networks are composed of heterogeneous systems, legacy applications, and high-value endpoints that do not always respond predictably to vendor-supplied patches. This incident illustrates that even a routine security update can cascade into operational chaos, forcing security teams to make difficult trade-offs between maintaining productivity and protecting systems from known vulnerabilities.
Security teams must be proactive in anticipating potential failures. Maintaining flexible rollback plans, staging updates in phased deployments, and leveraging telemetry for early detection are no longer optionalâthey are essential. Organizations that treat patches as potential operational hazards, rather than guaranteed improvements, are better prepared to act quickly when disruptions occur. Clear communication with leadership and cross-functional teams ensures that decisions are understood and coordinated, minimizing both confusion and risk during critical incidents.
Ultimately, the KB5074109 incident underscores a deeper truth about enterprise security: it is not just about applying patches on schedule. True security requires informed decision-making, situational awareness, and resilience under pressure. Teams that cultivate these qualities are equipped to navigate the unpredictable landscape of IT operations, respond effectively to unexpected disruptions, and preserve both security and operational continuity in the face of failuresâeven when those failures originate from the vendor itself.
Conclusion: Balancing Security and Stability in Windows 11
The KB5074109 disruption demonstrates that even updates from a trusted vendor like Micro$lop can introduce significant risks to operational continuity. No matter how routine a patch may seem, its deployment can reveal hidden dependencies, software conflicts, or unexpected failures that ripple through an organizationâs IT infrastructure. This incident reminds security teams that trust in the vendor does not replace vigilanceâevery update must be approached with an understanding of potential impacts and a readiness to respond if systems behave unpredictably.
Balancing patch management with system stability is an ongoing challenge for enterprise IT. Security teams must combine threat modeling with continuous telemetry monitoring to identify which vulnerabilities remain exposed, which endpoints are at risk, and what compensating controls can mitigate threats while preserving business continuity. From tuning endpoint protection to implementing temporary network segmentation or access restrictions, these measures provide a layered defense that buys time until a stable patch or hotfix can be deployed. The key is strategic thinking: security is not simply about applying updates on schedule, but about making informed choices under pressure.
Ultimately, resilience, careful planning, and structured communication remain the most reliable tools for navigating unexpected disruptions. Organizations that cultivate these capabilities are better equipped to respond to patch failures, maintain security hygiene, and preserve operational continuity even when trusted updates go awry. KB5074109 is a clear reminder that security is as much about preparedness and adaptability as it is about technologyâit is the teams, processes, and decision-making frameworks behind the screens that determine whether an enterprise can weather the storm.
Call to Action
If this breakdown helped you think a little clearer about the threats out there, donât just click away. Subscribe for more no-nonsense security insights, drop a comment with your thoughts or questions, or reach out if thereâs a topic you want me to tackle next. Stay sharp out there.
D. Bryan King
Sources
Windows 11 update KB5074109 breaking systems â Micro$lop urges uninstall
Micro$lop says uninstall KB5074109 to fix Outlook hang
Micro$lop tells you to uninstall latest Windows 11 update
Understanding the risks of uninstalling security updates â Micro$lop Support
How to uninstall a Windows Update â Micro$lop Support
Micro$lop confirms Windows 11 January 2026 Update issues
Windows 11 Update Issues Force User Choice
Security Implications of User Nonâcompliance Behavior to Software Updates: A Risk Assessment Study
To Patch, or not To Patch? A Case Study of System Administrators
Disclaimer:
The views and opinions expressed in this post are solely those of the author. The information provided is based on personal research, experience, and understanding of the subject matter at the time of writing. Readers should consult relevant experts or authorities for specific guidance related to their unique situations.
#businessContinuityPlanning #CISOGuidance #compensatingControls #criticalVulnerabilities #defenseInDepth #emergencyRollback #endpointAnomalies #endpointProtection #enterpriseITManagement #enterpriseSecurity #highValueEndpoints #ITCommunication #ITIncidentResponse #ITLeadership #ITOperations #ITResilience #ITRiskManagement #KB5074109 #MicroLop #MicroLopPatchProblem #MicrosoftUpdateIssues #networkSegmentation #operationalContinuity #operationalRisk #OutlookCrashes #patchAdvisory #patchDeployment #patchFailureResponse #patchManagement #patchTesting #phasedRollout #RemoteDesktopFailures #rollbackProcedures #securityBestPractices #securityHygiene #securityOperations #securityPatchRisk #SOCTeams #softwareUpdateFailure #systemCrashesWindows #systemMonitoring #systemStability #telemetryMonitoring #ThreatModeling #uninstallWindowsUpdate #updateCrisis #updateFailures #updateHazards #updateRollback #updateStrategy #vulnerabilityMitigation #Windows11KB5074109 #Windows11Security #Windows11Update #WindowsPatchIssues
Unsere neue Podcast-Folge ist da! đ
In dieser Podcast-Episode berichten Michael BrĂŒgge und Hagen Molzer, Leitende Berater bei cirosec, ĂŒber MaĂnahmen, die erfolgreiche Angriffe deutlich erschweren. Anhand realer Erfahrungen aus Red-Team-Assessments sprechen sie darĂŒber, warum die Sensibilisierung von Mitarbeitern, Defense in Depth, Active-Directory-HĂ€rtung, Tiering-Modelle, Netzwerk- und Mikrosegmentierung sowie moderne Angriffserkennung entscheidend sind.
Sie zeigen in dieser Folge, wie gute Vorbereitung, saubere Architektur und funktionierende Reaktionsprozesse Angreifer ausbremsen â und warum genau darin die gröĂte Chance fĂŒr Verteidiger liegt.
Jetzt reinhören unter:
đ§ Spotify: https://open.spotify.com/show/63K9JjKKOdewLx2Ma0DuNE
đ Apple Podcast: https://podcasts.apple.com/de/podcast/it-security-inside/id1751424875
đ Website: https://cirosec.de/podcast/
#Podcast #ITSecurity #CyberSecurity #RedTeam #BlueTeam #DefenseInDepth #ActiveDirectory #ThreatDetection #IncidentResponse #Tiering #Netzwerksegmentierung #Mikrosegmentierung
The Brutal Truth About âTrustedâ Phishing: Why Even Apple Emails Are Burning Your SOC
1,158 words, 6 minutes read time.
Iâve been in this field long enough to recognize a pattern that keeps repeating, no matter how much tooling we buy or how many frameworks we cite. Every major incident, every ugly postmortem, every late-night bridge call starts the same way: someone trusted something they were conditioned to trust. Not a zero-day, not a nation-state exploit chain, not some mythical hacker geniusâjust a moment where a human followed a path that looked legitimate because the system trained them to do exactly that. We like to frame cybersecurity as a technical discipline because that makes it feel controllable, but the truth is that most real-world compromises are social engineering campaigns wearing technical clothing. The Apple phishing scam circulating right now is a perfect example, and if you dismiss it as âjust another phishing email,â youâre missing the point entirely.
Hereâs what makes this particular scam dangerous, and frankly impressive from an adversarial perspective. The victim receives a text message warning that someone is trying to access their Apple account. Immediately, the attacker injects urgency, because urgency shuts down analysis faster than any exploit ever could. Then comes a phone call from someone claiming to be Apple Support, speaking confidently, calmly, and procedurally. They explain that a support ticket has been opened to protect the account, and shortly afterward, the victim receives a real, legitimate email from Apple with an actual case number. No spoofed domain, no broken English, no obvious red flags. At that moment, every instinct weâve trained users to rely on fires in the wrong direction. The email is real. The ticket is real. The process is real. The only thing that isnât real is the person on the other end of the line. When the attacker asks for a one-time security code to âclose the ticket,â the victim believes theyâre completing a security process, not destroying it. That single moment hands the attacker the keys to the account, cleanly and quietly, with no malware and almost no telemetry.
What makes this work so consistently is that attackers have finally accepted what many defenders still resist admitting: humans are the primary attack surface, and trust is the most valuable credential in the environment. This isnât phishing in the classic sense of fake emails and bad links. This is confidence exploitation, the same psychological technique that underpins MFA fatigue attacks, helpdesk impersonation, OAuth consent abuse, and supply-chain compromise. The attacker doesnât need to bypass controls when they can persuade the user to carry them around those controls and hold the door open. In that sense, this scam isnât new at all. Itâs the same strategy that enabled SolarWinds to unfold quietly over months, the same abuse of implicit trust that allowed NotPetya to detonate across global networks, and the same manipulation of expected behavior that made Stuxnet possible. Different scale, different impact, same foundational weakness.
From a framework perspective, this attack maps cleanly to MITRE ATT&CK, and that matters because frameworks are how we translate gut instinct into organizational understanding. Initial access occurs through phishing, but the real win for the attacker comes from harvesting authentication material and abusing valid accounts. Once theyâre in, everything they do looks legitimate because it is legitimate. Logs show successful authentication, not intrusion. Alerts donât fire because controls are doing exactly what they were designed to do. This is where Defense in Depth quietly collapses, not because the layers are weak, but because they are aligned around assumptions that no longer hold. We assume that legitimate communications can be trusted, that MFA equals security, that awareness training creates resilience. In reality, these assumptions create predictable paths that adversaries now exploit deliberately.
If youâve ever worked in a SOC, you already know why this type of attack gets missed. Analysts are buried in alerts, understaffed, and measured on response time rather than depth of understanding. A real Apple email doesnât trip a phishing filter. A user handing over a code doesnât generate an endpoint alert. Thereâs no malicious attachment, no beaconing traffic, no exploit chain to reconstruct. By the time anything unusual appears in the logs, the attacker is already authenticated and blending into normal activity. At that point, the investigation starts from a place of disadvantage, because youâre hunting something that looks like business as usual. This is how attackers win without ever making noise.
The uncomfortable truth is that most organizations are still defending against yesterdayâs threats with yesterdayâs mental models. We talk about Zero Trust, but we still trust brands, processes, and authority figures implicitly. We talk about resilience, but we train users to comply rather than to challenge. We talk about human risk, but we treat training as a checkbox instead of a behavioral discipline. If youâre a practitioner, the takeaway here isnât to panic or to blame users. Itâs to recognize that trust itself must be treated as a controlled resource. Verification cannot stop at the domain name or the sender address. Processes that allow external actors to initiate internal trust workflows must be scrutinized just as aggressively as exposed services. And security teams need to start modeling social engineering as an adversarial tradecraft, not an awareness problem.
For SOC analysts, that means learning to question âlegitimateâ activity when context doesnât line up, even if the artifacts themselves are clean. For incident responders, it means expanding investigations beyond malware and into identity, access patterns, and user interaction timelines. For architects, it means designing systems that minimize the blast radius of human error rather than assuming it wonât happen. And for CISOs, it means being honest with boards about where real risk lives, even when that conversation is uncomfortable. The enemy is no longer just outside the walls. Sometimes, the gate opens because we taught it how.
Iâve said this before, and Iâll keep saying it until it sinks in: trust is not a security control. Itâs a vulnerability that must be managed deliberately. Attackers understand this now better than we do, and until we catch up, theyâll keep walking through doors we swear are locked.
Call to Action
If this breakdown helped you think a little clearer about the threats out there, donât just click away. Subscribe for more no-nonsense security insights, drop a comment with your thoughts or questions, or reach out if thereâs a topic you want me to tackle next. Stay sharp out there.
D. Bryan King
Sources
MITRE ATT&CK Framework
NIST Cybersecurity Framework
CISA â Avoiding Social Engineering and Phishing Attacks
Verizon Data Breach Investigations Report
Mandiant Threat Intelligence Reports
CrowdStrike Global Threat Report
Krebs on Security
Schneier on Security
Black Hat Conference Whitepapers
DEF CON Conference Archives
Microsoft Security Blog
Apple Platform Security
Disclaimer:
The views and opinions expressed in this post are solely those of the author. The information provided is based on personal research, experience, and understanding of the subject matter at the time of writing. Readers should consult relevant experts or authorities for specific guidance related to their unique situations.
#accountTakeover #adversaryTradecraft #ApplePhishingScam #attackSurfaceManagement #authenticationSecurity #breachAnalysis #breachPrevention #businessEmailCompromise #CISOStrategy #cloudSecurityRisks #credentialHarvesting #cyberDefenseStrategy #cyberIncidentAnalysis #cyberResilience #cyberRiskManagement #cybercrimeTactics #cybersecurityAwareness #defenseInDepth #digitalIdentityRisk #digitalTrustExploitation #enterpriseRisk #enterpriseSecurity #humanAttackSurface #identityAndAccessManagement #identitySecurity #incidentResponse #informationSecurity #MFAFatigue #MITREATTCK #modernPhishing #NISTFramework #phishingAttacks #phishingPrevention #securityArchitecture #SecurityAwarenessTraining #securityCulture #securityLeadership #securityOperationsCenter #securityTrainingFailures #SOCAnalyst #socialEngineering #threatActorPsychology #threatHunting #trustedBrandAbuse #trustedPhishing #userBehaviorRisk #zeroTrustSecurity
đ Backups are the last line of defense â and attackers know it.
I put together a full defense-in-depth guide covering identity isolation, network segmentation, immutability, offline media, and operational hardening.
Read it here:
https://jonahmay.net/defense-in-depth-across-identity-network-storage-physical-and-operational-domains/
#ClickFix attacks remain a very serious threat to organisations.
In my latest #blog #post I explore what these attacks are, and how we can leverage a #defenseindepth approach to #protect ourselves and our users from them.
#cybersecurity #cyber #microsoft #email
https://marshsecurity.org/protecting-against-clickfix-with-the-microsoft-stack/