Did you know Microsoft has teamed up with major enterprise OEMs like Dell and HP, to let you configure UEFI settings via the Intune agent? Managing UEFI settings, like enforcing Secure Boot, implementing DMA safeguards, deploying UEFI Updates and other platform...
Mini SOC and Continuous Assessment: Achieving security visibility for faster detection and response
Increase Visibility Microsoft's new Digital Defense Report is out, and they revealed that attackers have accelerated their innovation over the past year and rapidly developing new techniques bypassing traditional security measures. They have become more advanced and...
SharePoint Server Critical Vulnerabilities
We would like to inform you about the following two critical vulnerabilities affecting SharePoint Server (2016, 2019, SE releases), which allow attackers to use a so-called "ToolShell" attack that provides unauthenticated access to systems and enables malicious actors...
Advanced phishing with legitimate emails
Phishing attacks have evolved, targeting collaborative cloud platforms to bypass conventional email security measures. Microsoft SharePoint and OneNote have become prominent tools for these sophisticated attacks. As email protection solutions advance, so do the...
Microsoft 365 E5 Security Now Available for SMBs
Microsoft has taken a significant step to help small and medium-sized businesses (SMBs) protect their data and maintain regulatory compliance in today’s evolving threat environment. In response to these challenges, Microsoft has introduced the Microsoft 365 E5...
Top 10 Cybersecurity Trends in 2025
Cyber threats are evolving rapidly in 2025. Staying ahead requires a proactive approach to innovation, compliance, and resilience.
Start your Passwordless Journey with Black Cell!
In today's digital age, securing your organization's data is more critical than ever. Passwords, though traditional, often fall short in providing the robust security needed to protect against modern cyber threats. That's where passwordless authentication comes into...
Data is your responsibility, especially when your cloud provider fails you
When using cloud-based services as a customer, it’s easy to forget about one’s own responsibilities: cloud is elastic, agile, scalable, and you don’t have to buy, place and cool big, power-hungry server machines in your datacenter. You pay your monthly bill, and the...
MDR vs No MDR?
With MDR: MDR services leverage advanced technologies to continuously monitor your network, swiftly identifying and mitigating potential threats. It provides enhanced security through continuous monitoring and expert response, proactive defense measures, access to...









