- Telecom Services
- OT Security services
- CONSULTANCY
- RISK ASSESSMENT
- REGULATORY COMPLIANCE
- ASSET HARDENING
- NETWORK SEGMENTATION
- OT ASSET INVENTORY
- OT VULNERABILITY ASSESSMENT
- PENETRATION TESTING
- INCIDENT RESPONSE
- INDUSTRIAL SECURITY TTX
- STAFF AUGMENTATION
- OT CYBER SECURITY FRAMEWORK
- OT CYBER SECURITY PROGRAM
- DIGITAL FORENSICS INCIDENT RESPONSE (DFIR)
- MALEVOLENT THREAT ACTOR MONITORING
- Capital Project Assurance
- Architecture Assessment
‘Sneaky Log’ phishing kits slip by Microsoft 365 accounts
A new Adversary-in-the-Middle (AiTM) phishing kit targeting Microsoft 365 accounts has the ability to intercept both user credentials a...