Cloud Security
Harden your UEFI configurations with Intune and Entra ID

Harden your UEFI configurations with Intune and Entra ID

Did you know Microsoft has teamed up with major enterprise OEMs like Dell and HP, to let you configure UEFI settings via the Intune agent? Managing UEFI settings, like enforcing Secure Boot, implementing DMA safeguards, deploying UEFI Updates and other platform...

SharePoint Server Critical Vulnerabilities

SharePoint Server Critical Vulnerabilities

We would like to inform you about the following two critical vulnerabilities affecting SharePoint Server (2016, 2019, SE releases), which allow attackers to use a so-called "ToolShell" attack that provides unauthenticated access to systems and enables malicious actors...

Advanced phishing with legitimate emails

Advanced phishing with legitimate emails

Phishing attacks have evolved, targeting collaborative cloud platforms to bypass conventional email security measures. Microsoft SharePoint and OneNote have become prominent tools for these sophisticated attacks. As email protection solutions advance, so do the...

Microsoft 365 E5 Security Now Available for SMBs

Microsoft 365 E5 Security Now Available for SMBs

Microsoft has taken a significant step to help small and medium-sized businesses (SMBs) protect their data and maintain regulatory compliance in today’s evolving threat environment. In response to these challenges, Microsoft has introduced the Microsoft 365 E5...

Start your Passwordless Journey with Black Cell!

Start your Passwordless Journey with Black Cell!

In today's digital age, securing your organization's data is more critical than ever. Passwords, though traditional, often fall short in providing the robust security needed to protect against modern cyber threats. That's where passwordless authentication comes into...

MDR vs No MDR?

MDR vs No MDR?

With MDR: MDR services leverage advanced technologies to continuously monitor your network, swiftly identifying and mitigating potential threats. It provides enhanced security through continuous monitoring and expert response, proactive defense measures, access to...