With Intune you can manage devices and apps of your employees as well as their access to your company data. To use this Mobile Device Management (MDM) system, devices must first be registered for the Intune service. However, there are several ways to register your employee’s devices. Each method depends on the type of device […]
Prolog At this point I am happy to present the third part of my series “Phishing attack simulation”. In this article we will focus on Brute force Password (Dictionary) attacks. A brute-force attack dictionary is an automated, trial-and-error method of generating multiple passwords guesses from a dictionary file against a user’s password. Identical to Spear […]
Prolog In my last article about this topic I have described how you can perform simulated phishing attacks on your own infrastructure. This is all about raising the awareness of your own employees. If you haven’t read this article yet, I recommend you do that later. This article is based in many points of the […]