Controlling Web Sites Connecting to Local Network

🚦Read below before you hit Allow or Block! Have you seen this annoying little messge popping up all over Edge browser (and other Chromium based broswers) lately? This is a recent update came into Chromium based browsers and noticed it in Edge with the Edge December 2025 update - Version 143 and in Chrome 142 … Continue reading Controlling Web Sites Connecting to Local Network

Guest User Access: A High-Level Checklist

The Guest User access dilemma in Entra is real. Balancing collaboration and security without distracting productivity is a challenge, but that's something you can't put on the back burner, because it can be the "Silent Insider Threat" you’re ignoring.🚩If you block Guest access completely, that can possibly degrade end user productivity. So how to balance … Continue reading Guest User Access: A High-Level Checklist

How Office Macros Expand the Attack Surface

Regardless the size of the organization. There is always one or few macros setup in excel files that does some tasks for the users. These macros are so critical to the business, and most of the time employees' tasks are evolving around them.And most of the time, people who create the macros in the organization … Continue reading How Office Macros Expand the Attack Surface

Securing LSASS – Controls to Minimise Attack Surface

LSASS, one of the most important pieces in an OS - say Windows 11, and one of the pieces that a threat actors are very tempted to keep their hands on. LSASS - Local Security Authority Subsystem Service, the process which is responsible for handling authentication, logon and security policies on Windows. Often, organizations don't … Continue reading Securing LSASS – Controls to Minimise Attack Surface

Windows Quick Machine Recovery With Microsoft Intune

We all witnessed the incident where Windows devices worldwide got hammered by the AV update that caused Windows to go BSOD. Machine recovery was one of the top things probably the IT admins did post incident to get their endpoints fleet up and running ASAP again to support day to day and all the critical … Continue reading Windows Quick Machine Recovery With Microsoft Intune

Why Defendnot is a Wake-up Call? A Ground Level Analysis

TL;DR If you are in the Security world, I believe you have heard all about Defendnot and how lethal it can be. The TL;DR is, Defendnot is a research project (by es3n1n), which is a tool that silently disables Defender AV when a 3rd party AV is not installed in the endpoint. When it's successfully … Continue reading Why Defendnot is a Wake-up Call? A Ground Level Analysis