
Sign up to save your podcasts
Or
This week, we discuss a phishing technique that uses a powerful and risky Microsoft 365 configuration setting. After that, we round up everything we know about the Marks & Spencer breach from April and the lessons that all MSPs can learn from it. After that, we quickly cover a new series of vulnerabilities in a popular Bluetooth chipset that could let attackers gain full control over your headphones.
4.7
4040 ratings
This week, we discuss a phishing technique that uses a powerful and risky Microsoft 365 configuration setting. After that, we round up everything we know about the Marks & Spencer breach from April and the lessons that all MSPs can learn from it. After that, we quickly cover a new series of vulnerabilities in a popular Bluetooth chipset that could let attackers gain full control over your headphones.
1,979 Listeners
365 Listeners
626 Listeners
22,072 Listeners
366 Listeners
183 Listeners
1,009 Listeners
312 Listeners
413 Listeners
7,879 Listeners
166 Listeners
314 Listeners
127 Listeners
43 Listeners
167 Listeners