ATTENTION! In the periphery of myDRE a phishing attack is/was executed

We have learned that there is/was a large phishing attack by one of our Tenants.
When you receive emails:
- Don't panic
- Don't click any links
- Check the Sender
- If 'phishy'
- DO NOT DELETE, until instructed
- report the email to
- Your company
- If seems to come from myDRE/anDREa, please submit support.mydre.org via ticket as well
Related Articles
Roles in myDRE workspace
Roles are defined per workspace. A myDRE user can have different roles in different workspaces they are part of. The role definitions are defined further in this document: Roles in myDRE workspace.
myDRE is NOT vulnerable for Text4Shell (CVE-2022-42889)
TL;DR myDRE is NOT vulnerable for Text4Shell (CVE-2022-42889). The National Cyber Security Center (NCSC) has announced that a vulnerability with impact High/High (CVE-2022-42889) has been identified in Apache Commons Text v1.5-v1.9. It is being ...
Showcase your myDRE success and get sponsored!
Attention all myDRE users! Did you know you anDREa is willing to sponsor up to €250 for sharing how myDRE empowers your research? Here's how it works: Incorporate myDRE: Feature our logo, QR code, or a brief mention in your publications, ...
Why Direct SSH Access is Restricted in myDRE
In the myDRE environment, direct SSH access to virtual machines (VMs) is blocked for security, technical, and compliance reasons. Instead, users must connect through Azure Bastion, a secure way to access their VMs. Here’s why this approach is ...
myDRE - why
Why myDRE was created in <1.5 minutes For more information From organization perspective anDREa FAQ From user perspective myDRE Or contact a colleague: Pascalle Broer