Technology and Security
Smartphones have become far more than communication devices – they’re the keys to our digital lives. Banking apps, email, photos, passwords, health data, even the ability to unlock your front…
When we think about protecting Microsoft Entra tenants, the conversation often revolves around user identities, conditional access, and multi-factor authentication. Those are all critical – but one piece is often…
Expired Domains in Microsoft 365: A Hidden Backdoor to Your Tenant Microsoft 365 tenants typically use custom verified domains (like cybaa.io) for user identities and email addresses. Over time, domains may…
Recently I received notifications from Starling for card transactions totalling £450 that were not made by me (annoyingly they didn’t go through 3-D Secure for some reason, so for all…
Microsoft is gearing up for a significant shift in its email security infrastructure, replacing the familiar “mail.protection.outlook.com” with a new set of subdomains under mx.microsoft. This exciting move, starting in…
TL;DR I was looking for an inexpensive way to get access to a lot of CPU compute, as inexpensively as I could in order to process a load of data…