<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	
	>
<channel>
	<title>
	Comments for Computer Services &amp; Solutions, INC.	</title>
	<atom:link href="https://cssi.us/comments/feed/" rel="self" type="application/rss+xml" />
	<link>https://cssi.us/</link>
	<description>431 S. Broadway Ave. Suite 222, Lexington, KY. (859) 226-9222</description>
	<lastBuildDate>Mon, 13 Jul 2020 17:02:15 +0000</lastBuildDate>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>
	<item>
		<title>
		Comment on Office 365 Vulnerable to Brute Force Attack via Powershell by Tyler		</title>
		<link>https://cssi.us/office-365-brute-force-powershell/#comment-34</link>

		<dc:creator><![CDATA[Tyler]]></dc:creator>
		<pubDate>Mon, 20 Aug 2018 18:00:35 +0000</pubDate>
		<guid isPermaLink="false">https://cssi.us/?p=456#comment-34</guid>

					<description><![CDATA[In reply to &lt;a href=&quot;https://cssi.us/office-365-brute-force-powershell/#comment-32&quot;&gt;Kieren Johnstone&lt;/a&gt;.

I informed support. Do you know a security email for office 365?]]></description>
			<content:encoded><![CDATA[<p>In reply to <a href="https://cssi.us/office-365-brute-force-powershell/#comment-32">Kieren Johnstone</a>.</p>
<p>I informed support. Do you know a security email for office 365?</p>
]]></content:encoded>
		
			</item>
		<item>
		<title>
		Comment on Office 365 Vulnerable to Brute Force Attack via Powershell by Dustin		</title>
		<link>https://cssi.us/office-365-brute-force-powershell/#comment-33</link>

		<dc:creator><![CDATA[Dustin]]></dc:creator>
		<pubDate>Sat, 18 Aug 2018 10:52:06 +0000</pubDate>
		<guid isPermaLink="false">https://cssi.us/?p=456#comment-33</guid>

					<description><![CDATA[It is the smart lockout feature: https://docs.microsoft.com/en-us/azure/active-directory/authentication/howto-password-smart-lockout

Why lock out the user when they can lockout the malicious actor?

Of course, MFA is the real solution and should be implemented, because they will just use a Password Spray attack which would be unlikely to raise any alarms.]]></description>
			<content:encoded><![CDATA[<p>It is the smart lockout feature: <a href="https://docs.microsoft.com/en-us/azure/active-directory/authentication/howto-password-smart-lockout" rel="nofollow ugc">https://docs.microsoft.com/en-us/azure/active-directory/authentication/howto-password-smart-lockout</a></p>
<p>Why lock out the user when they can lockout the malicious actor?</p>
<p>Of course, MFA is the real solution and should be implemented, because they will just use a Password Spray attack which would be unlikely to raise any alarms.</p>
]]></content:encoded>
		
			</item>
		<item>
		<title>
		Comment on Office 365 Vulnerable to Brute Force Attack via Powershell by Kieren Johnstone		</title>
		<link>https://cssi.us/office-365-brute-force-powershell/#comment-32</link>

		<dc:creator><![CDATA[Kieren Johnstone]]></dc:creator>
		<pubDate>Sat, 18 Aug 2018 07:50:16 +0000</pubDate>
		<guid isPermaLink="false">https://cssi.us/?p=456#comment-32</guid>

					<description><![CDATA[Didya do the whole responsible disclosure thing - contacted the appropriate security address for O365?]]></description>
			<content:encoded><![CDATA[<p>Didya do the whole responsible disclosure thing &#8211; contacted the appropriate security address for O365?</p>
]]></content:encoded>
		
			</item>
	</channel>
</rss>
