I presume this means you're now pirating. If so, then you've admitted you're a criminal. Nice work. If not, the what are you using your NAS for? Purchased content like I am?
I mean you can ask them https://t.me/s/noname05716eng
chat of NoName group skids doing some DDOSing, they pool their bots by community of like-minded people (Russians supporting current government, murder rape etc. you know)
I'm curious if somebody from Slack could comment how much the acquisition changed Slack technologies.
I have first hand info from Avast - Norton merger and turning into corporation which doesn't value good RE talents was ridiculous and I've worked in corporate before, but this was just another level.
Middle management and up, their technical knowledge ended at turning PC on, hehe.
Btw they forced everybody even devs/RE guys into switching from Slack to Teams.
But still I have respect for original owners who build this AV company from 0. Too bad over the years it turned into this BS, where gathering and selling people's data is a normal thing for them.
At least there are guys from ESET, which is where people really care about fighting malware.
People, don't forget to properly set all these checks for DNS failover.
I saw companies got scammed, because they used default settings in Exchange Online.
And attacker just made the DNS "unavailable" for brief moment and all phishing emails passed. Because MS server responded with DNS "temp error" and pass all emails as not a spam.
(detailed: received-spf: TempError (protection.outlook.com: error in processing during
lookup of <phished ___domain>: DNS Timeout)
and DKIM is checked on ___domain of sender's SMTP server, in this case attacker's server used for phishing
)
Then I had the great experience with MS IT/security support, people there can't even understand how emails works, very funny and sad experience. I hope outsourcing works for them.