Our security blogs

Bypassing Defender for Endpoint device isolation

My findings on bypassing Microsoft Defender for Endpoint 

Sikkerhedsmæssige risici ved trådløse enheder

(DK) My thoughts on various wireless protocols and risks using them (BT/Ir) 

En af de største sikkerhedstrusler er i lommen

(DK) My thoughts on the risks of using mobile devices in a cooporate environment 

Analysis of a phishing email

Deep-dive on a real phising email I recieved some years ago