Hacker Reveals New Authentication Bypass in Active Directory and Entra ID Environments

Image: SomYuZu/Adobe Stock At last week’s Black Hat event in Las Vegas, Dirk-jan Mollema, hacker, security researcher, and founder of Outsider Security, outlined a set of techniques for bypassing authentication…

Continue ReadingHacker Reveals New Authentication Bypass in Active Directory and Entra ID Environments

Apple vs. Starlink: The Tech Feud That Could Shape the Next Frontier of Mobile Service

Image: John Gress Media Inc, Shutterstock / John Gress Media Inc Apple is seeking to eliminate cell phone dead spots though expanded satellites, but Elon Musk’s Starlink won’t let that…

Continue ReadingApple vs. Starlink: The Tech Feud That Could Shape the Next Frontier of Mobile Service

Critical Zero-Day Vulnerabilities Found in These VMware Products

Broadcom has patched three actively exploited zero-day vulnerabilities in VMware ESXi, Workstation, and Fusion, discovered by Microsoft’s Threat Intelligence Center. The flaws, which were being leveraged in real-world attacks at…

Continue ReadingCritical Zero-Day Vulnerabilities Found in These VMware Products

Yes, a Multichannel Contact Center CAN Replace a Dozen Apps

Accommodating your customers’ communication preferences is important, especially as your business grows. This means supporting them via social media, website forms, live chat, SMS, traditional phone support, and any other…

Continue ReadingYes, a Multichannel Contact Center CAN Replace a Dozen Apps