
Sign up to save your podcasts
Or
This week, we discuss a phishing technique that uses a powerful and risky Microsoft 365 configuration setting. After that, we round up everything we know about the Marks & Spencer breach from April and the lessons that all MSPs can learn from it. After that, we quickly cover a new series of vulnerabilities in a popular Bluetooth chipset that could let attackers gain full control over your headphones.
4.7
4040 ratings
This week, we discuss a phishing technique that uses a powerful and risky Microsoft 365 configuration setting. After that, we round up everything we know about the Marks & Spencer breach from April and the lessons that all MSPs can learn from it. After that, we quickly cover a new series of vulnerabilities in a popular Bluetooth chipset that could let attackers gain full control over your headphones.
1,986 Listeners
639 Listeners
370 Listeners
183 Listeners
1,018 Listeners
318 Listeners
406 Listeners
7,951 Listeners
172 Listeners
189 Listeners
316 Listeners
77 Listeners
129 Listeners
43 Listeners
169 Listeners