
Sign up to save your podcasts
Or


This week, we discuss a phishing technique that uses a powerful and risky Microsoft 365 configuration setting. After that, we round up everything we know about the Marks & Spencer breach from April and the lessons that all MSPs can learn from it. After that, we quickly cover a new series of vulnerabilities in a popular Bluetooth chipset that could let attackers gain full control over your headphones.
By Secplicity4.7
4040 ratings
This week, we discuss a phishing technique that uses a powerful and risky Microsoft 365 configuration setting. After that, we round up everything we know about the Marks & Spencer breach from April and the lessons that all MSPs can learn from it. After that, we quickly cover a new series of vulnerabilities in a popular Bluetooth chipset that could let attackers gain full control over your headphones.

2,007 Listeners

1,028 Listeners

320 Listeners

3 Listeners

13 Listeners

176 Listeners

4 Listeners

315 Listeners

192 Listeners

74 Listeners

138 Listeners

16 Listeners

3 Listeners

3 Listeners

14 Listeners