<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" version="2.0">
  <channel>
    <title>News | planck Security</title>
    <link>https://www.planck.security/news</link>
    <description>Keep your pulse on the newest trends and updates about planck Security and the Zero Trust Communication security landscape.</description>
    <language>en</language>
    <pubDate>Tue, 05 Sep 2023 11:13:21 GMT</pubDate>
    <dc:date>2023-09-05T11:13:21Z</dc:date>
    <dc:language>en</dc:language>
    <item>
      <title>Microsoft Storm558 attack: Zero Trust could have mitigated risks</title>
      <link>https://www.planck.security/news/microsoft-storm558-attack</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.planck.security/news/microsoft-storm558-attack" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.planck.security/hubfs/blog/hacker.jpeg" alt="Microsoft Storm558 attack: Zero Trust could have mitigated risks" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;h3&gt;Zero Trust and end-to-end encryption in M365: how they mitigate risks&lt;/h3&gt; 
&lt;p&gt;In early July, it was revealed that a hacker group had gained access to sensitive areas within Microsoft's Azure platform, including access to mailboxes delivered from the cloud as part of the Microsoft 365 (M365) offering.&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.planck.security/news/microsoft-storm558-attack" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.planck.security/hubfs/blog/hacker.jpeg" alt="Microsoft Storm558 attack: Zero Trust could have mitigated risks" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;h3&gt;Zero Trust and end-to-end encryption in M365: how they mitigate risks&lt;/h3&gt; 
&lt;p&gt;In early July, it was revealed that a hacker group had gained access to sensitive areas within Microsoft's Azure platform, including access to mailboxes delivered from the cloud as part of the Microsoft 365 (M365) offering.&lt;/p&gt;  
&lt;img src="https://track-eu1.hubspot.com/__ptq.gif?a=139608088&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fwww.planck.security%2Fnews%2Fmicrosoft-storm558-attack&amp;amp;bu=https%253A%252F%252Fwww.planck.security%252Fnews&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Insight</category>
      <pubDate>Wed, 30 Aug 2023 12:05:13 GMT</pubDate>
      <author>ip@planck.security (Ingo Pansa)</author>
      <guid>https://www.planck.security/news/microsoft-storm558-attack</guid>
      <dc:date>2023-08-30T12:05:13Z</dc:date>
    </item>
  </channel>
</rss>
