In this blog article, we would like to share key insights from the "Defeating Microsoft's Default BitLocker Implementation" security training by…

Read more

TL;DR An attacker is able to register new security keys (FIDO) or other authentication methods (TOTP, Email, Phone etc.) after a successful device…

Read more

With the rise of remote working, Microsoft Teams has become the de-facto standard for video conferences, chat, and collaboration. The nature of the…

Read more

In the era of the internet, scams vary in forms, targeting those who aren't cautious. Lately, a fresh scam focused on Switzerland has gained attention…

Read more

Device code phishing is nothing new. In fact it has been around for some years now. Despite the awesome capabilities of device code phishing, it is…

Read more