
Sign up to save your podcasts
Or


This week, we discuss a phishing technique that uses a powerful and risky Microsoft 365 configuration setting. After that, we round up everything we know about the Marks & Spencer breach from April and the lessons that all MSPs can learn from it. After that, we quickly cover a new series of vulnerabilities in a popular Bluetooth chipset that could let attackers gain full control over your headphones.
By Secplicity4.7
4040 ratings
This week, we discuss a phishing technique that uses a powerful and risky Microsoft 365 configuration setting. After that, we round up everything we know about the Marks & Spencer breach from April and the lessons that all MSPs can learn from it. After that, we quickly cover a new series of vulnerabilities in a popular Bluetooth chipset that could let attackers gain full control over your headphones.

189 Listeners

2,011 Listeners

371 Listeners

374 Listeners

651 Listeners

1,022 Listeners

318 Listeners

420 Listeners

8,044 Listeners

181 Listeners

316 Listeners

215 Listeners

137 Listeners

44 Listeners

34 Listeners