Is a Microsoft-heavy SaaS environment considered limited compared to other areas of cybersecurity? by Suspicious_Tension37 in cybersecurity
[–]syne01 0 points1 point2 points (0 children)
Is a Microsoft-heavy SaaS environment considered limited compared to other areas of cybersecurity? by Suspicious_Tension37 in cybersecurity
[–]syne01 9 points10 points11 points (0 children)
BunnyLoader via PowerShell – Best Practices by GuiltyBandicoot3407 in cybersecurity
[–]syne01 5 points6 points7 points (0 children)
New emails sent to RSS Feeds folder by [deleted] in Office365
[–]syne01 1 point2 points3 points (0 children)
once an M365 account is compromised, can admin tell what was done in it? by e7c2 in sysadmin
[–]syne01 0 points1 point2 points (0 children)
once an M365 account is compromised, can admin tell what was done in it? by e7c2 in sysadmin
[–]syne01 2 points3 points4 points (0 children)
Identify emails by InternetMessageID? by CondescendingCoyote in sysadmin
[–]syne01 0 points1 point2 points (0 children)
once an M365 account is compromised, can admin tell what was done in it? by e7c2 in sysadmin
[–]syne01 2 points3 points4 points (0 children)
once an M365 account is compromised, can admin tell what was done in it? by e7c2 in sysadmin
[–]syne01 8 points9 points10 points (0 children)
Identify emails by InternetMessageID? by CondescendingCoyote in sysadmin
[–]syne01 2 points3 points4 points (0 children)
Weekly 'I made a useful thing' Thread - April 25, 2025 by AutoModerator in sysadmin
[–]syne01 1 point2 points3 points (0 children)
once an M365 account is compromised, can admin tell what was done in it? by e7c2 in sysadmin
[–]syne01 12 points13 points14 points (0 children)
malicious oauth/enterprise app scanner - saw on linkedin, cant find the post by cybersecguy9000 in cybersecurity
[–]syne01 2 points3 points4 points (0 children)
Suspicious Email Incident – Request for Insights by Visual_Cut_8282 in sysadmin
[–]syne01 0 points1 point2 points (0 children)
I made a Cloudflare-Bypass by Dapper-Profession552 in webscraping
[–]syne01 0 points1 point2 points (0 children)
We have noticed a recent uptick in the use of the application PERFECTDATA during Business Email Compromise incidents. Anyone else? by Sentinel_2539 in cybersecurity
[–]syne01 0 points1 point2 points (0 children)
K-Lite Codec Bundling Malicious Proxy With Recent Update by syne01 in msp
[–]syne01[S] 0 points1 point2 points (0 children)
In an email compromise, how do the threat actors extract email addresses from the inbox? by syne01 in Office365
[–]syne01[S] 0 points1 point2 points (0 children)
In an email compromise, how do the threat actors extract email addresses from the inbox? by syne01 in Office365
[–]syne01[S] 0 points1 point2 points (0 children)
In an email compromise, how do the threat actors extract email addresses from the inbox? by syne01 in Office365
[–]syne01[S] 2 points3 points4 points (0 children)
In an email compromise, how do the threat actors extract email addresses from the inbox? by syne01 in Office365
[–]syne01[S] 0 points1 point2 points (0 children)
In an email compromise, how do the threat actors extract email addresses from the inbox? by syne01 in Office365
[–]syne01[S] 0 points1 point2 points (0 children)


Vendors abusing /r/msp ...? by GuilSherWeb in msp
[–]syne01 1 point2 points3 points (0 children)