Tiering Entra roles and application permissions based on known attack paths
An attempt to better understand the security implications of cloud administrative assets.
An attempt to better understand the security implications of cloud administrative assets.
Investigating legacy permissions.
Bypassing assignment, eligibility and activation requirements.
Escalating to Global Admin via eligible assignments.
Escalating to Global Admin via active assignments.
How trusting container images may allow threat actors to spread in container-based infrastructures like Kubernetes.
How enabling a single vulnerable feature removed the entire network and identity perimeter around internet-isolated Azure Cognitive Search instances.
How a few common misconceptions about vulnerability patching and detection in software containers can give a false sense of security, and cause you to potent...