home.social

#mdo โ€” Public Fediverse posts

Live and recent posts from across the Fediverse tagged #mdo, aggregated by home.social.

  1. New ๐—จ๐—ฝ๐—น๐—ถ๐—ณ๐˜ ๐—ฃ๐—ฟ๐—ถ๐˜ƒ๐—ถ๐—น๐—ฒ๐—ด๐—ฒ๐˜€ ๐—ผ๐—ป ๐—™๐—ฟ๐—ฒ๐—ฒ๐—•๐—ฆ๐—— [Uplift Privileges on FreeBSD] article on vermaden.wordpress.com blog

    vermaden.wordpress.com/2026/03

    #verblog #freebsd #linux #illumos #solaris #sudo #doas #su #mdo

  2. New ๐—จ๐—ฝ๐—น๐—ถ๐—ณ๐˜ ๐—ฃ๐—ฟ๐—ถ๐˜ƒ๐—ถ๐—น๐—ฒ๐—ด๐—ฒ๐˜€ ๐—ผ๐—ป ๐—™๐—ฟ๐—ฒ๐—ฒ๐—•๐—ฆ๐—— [Uplift Privileges on FreeBSD] article on vermaden.wordpress.com blog

    vermaden.wordpress.com/2026/03

    #verblog #freebsd #linux #illumos #solaris #sudo #doas #su #mdo

  3. New ๐—จ๐—ฝ๐—น๐—ถ๐—ณ๐˜ ๐—ฃ๐—ฟ๐—ถ๐˜ƒ๐—ถ๐—น๐—ฒ๐—ด๐—ฒ๐˜€ ๐—ผ๐—ป ๐—™๐—ฟ๐—ฒ๐—ฒ๐—•๐—ฆ๐—— [Uplift Privileges on FreeBSD] article on vermaden.wordpress.com blog

    vermaden.wordpress.com/2026/03

    #verblog #freebsd #linux #illumos #solaris #sudo #doas #su #mdo

  4. New ๐—จ๐—ฝ๐—น๐—ถ๐—ณ๐˜ ๐—ฃ๐—ฟ๐—ถ๐˜ƒ๐—ถ๐—น๐—ฒ๐—ด๐—ฒ๐˜€ ๐—ผ๐—ป ๐—™๐—ฟ๐—ฒ๐—ฒ๐—•๐—ฆ๐—— [Uplift Privileges on FreeBSD] article on vermaden.wordpress.com blog

    vermaden.wordpress.com/2026/03

    #verblog #freebsd #linux #illumos #solaris #sudo #doas #su #mdo

  5. New ๐—จ๐—ฝ๐—น๐—ถ๐—ณ๐˜ ๐—ฃ๐—ฟ๐—ถ๐˜ƒ๐—ถ๐—น๐—ฒ๐—ด๐—ฒ๐˜€ ๐—ผ๐—ป ๐—™๐—ฟ๐—ฒ๐—ฒ๐—•๐—ฆ๐—— [Uplift Privileges on FreeBSD] article on vermaden.wordpress.com blog

    vermaden.wordpress.com/2026/03

    #verblog #freebsd #linux #illumos #solaris #sudo #doas #su #mdo

  6. One specific change I noticed is that #Safelink capabilities are moved from add-on #MDO to E3 & Business plans, which I've been advocating for (IMHO this is basic security). As #Phishing or #BEC impact is still high according to #Microsoft Digital Defense Report 2025, this is a change that can make #security defense more in-depth.
    Reread the report: microsoft.com/en-us/corporate-

    What do you think of these changes? Is the price increase warranted? What did you miss and wanted to see? Let me know!

  7. ๐๐ซ๐จ๐ญ๐ž๐œ๐ญ ๐ฒ๐จ๐ฎ๐ซ ๐จ๐ซ๐ ๐š๐ง๐ข๐ณ๐š๐ญ๐ข๐จ๐ง๐ฌ ๐š๐ ๐š๐ข๐ง๐ฌ๐ญ ๐๐‘ ๐œ๐จ๐๐ž ๐ฉ๐ก๐ข๐ฌ๐ก๐ข๐ง๐  ๐ฐ๐ข๐ญ๐ก ๐ƒ๐ž๐Ÿ๐ž๐ง๐๐ž๐ซ ๐Ÿ๐จ๐ซ ๐Ž๐Ÿ๐Ÿ๐ข๐œ๐ž 365

    QR codes are used in phishing attacks for mainly two reasons:

    1๏ธโƒฃ They move the attack away from well-protected corporate environments and onto the victimโ€™s personally owned mobile device, which may be less secure.

    2๏ธโƒฃ They leverage the most common credential theft vector which is the uniform resource locator (URL).

    ๐‡๐จ๐ฐ ๐Œ๐ƒ๐Ž ๐๐ž๐ญ๐ž๐œ๐ญ๐ฌ ๐๐‘ ๐‚๐จ๐๐ž ๐ฉ๐ก๐ข๐ฌ๐ก๐ข๐ง๐ 

    โžก Image Detection in a message inline during mail flow

    โžกThreat Signals

    โžกURL Analysis

    โžกHeuristics-based Rules

    To further increase protection, it is recommended to use:

    โžก๐„๐ฑ๐ญ๐ž๐ง๐๐ž๐ ๐ƒ๐ž๐ญ๐ž๐œ๐ญ๐ข๐จ๐ง ๐š๐ง๐ ๐‘๐ž๐ฌ๐ฉ๐จ๐ง๐ฌ๐ž (XDR): Microsoft Defender XDR provides comprehensive defense against advanced threats like QR code phishing

    โžก๐Œ๐จ๐›๐ข๐ฅ๐ž ๐๐ซ๐จ๐ญ๐ž๐œ๐ญ๐ข๐จ๐ง: Microsoft Defender for Endpoint on Android and iOS includes anti-phishing capabilities that also apply to QR code phishing attacks, blocking phishing sites from being accessed.

    โžก๐„๐ง๐-๐”๐ฌ๐ž๐ซ ๐“๐ซ๐š๐ข๐ง๐ข๐ง๐ : Defender for Office 365 customers can use Attack Simulation Training to educate their end users by simulating real-world phishing attacks and other types of cyber threats.

    techcommunity.microsoft.com/t5

    #qrcode #phishing #mdo #defenderforoffice #defender #xdr #edr #office365 #image #url #microsoft #microsoftsecurity #soc #cyber #cybersecurity #ast #usertraining #awareness #Quishing #cloudsecurity

  8. ๐—–๐—ผ๐—ป๐—ณ๐—ถ๐—ด๐˜‚๐—ฟ๐—ฒ ๐—๐˜‚๐˜€๐˜-๐—ถ๐—ป-๐—ง๐—ถ๐—บ๐—ฒ ๐—”๐—ฐ๐—ฐ๐—ฒ๐˜€๐˜€ ๐˜๐—ผ ๐— ๐Ÿฏ๐Ÿฒ๐Ÿฑ ๐——๐—ฒ๐—ณ๐—ฒ๐—ป๐—ฑ๐—ฒ๐—ฟ

    ๐Ÿ”ตEntra ID (formerly Azure AD) offers the Privileged Identity Management (PIM) for Groups feature, enabling users to attain just-in-time membership and ownership of groups, thus governing access to a range of services.

    ๐Ÿ”ตM365 Defender unified RBAC workloads offers centralized permissions management for the following services:

    โžก๏ธDefender for Endpoint

    โžก๏ธDefender for Identity

    โžก๏ธDefender for Cloud Apps

    โžก๏ธDefender for Office 365

    โžก๏ธMicrosoft Defender Vulnerability Management

    โžก๏ธSecure score

    PIM for Groups paired with M365 Defender RBAC offers a solution for just-in-time Defender access.

    Find out more details: techcommunity.microsoft.com/t5

    #azure #azuread #entraid #identity #rbac #m365defender #xdr #justintime #pim #pam #mde #mdo #mdi #securescore #mdca #casb #microsoft #microsoftsecurity #soc #cloud #cloudsecurity #cloudnative

  9. A quick #securitytip on how to block password-protected attachments in emails.

    If you have #Microsoft #Defender for #Office365 licenses, you can use the technology called Safe Attachments. Safe Attachments do advanced scanning of attachments through so called detonations, where these attachments are run on a test environment and what the file does when it is run is monitored.

    If an email contains a password-protected attachment, then these detonations cannot take place. In the Safe Attachments settings, you can set what should happen if the scan couldn't complete for some reason, which is exactly the case with the password-protected attachment. In this case, it is recommended to set the email to be blocked. #email #mdo #cybersecurity #bes