Tiering Entra roles and application permissions based on known attack paths
An attempt to better understand the security implications of cloud administrative assets.
An attempt to better understand the security implications of cloud administrative assets.
Investigating legacy permissions.
Bypassing assignment, eligibility and activation requirements.
Escalating to Global Admin via eligible assignments.
Escalating to Global Admin via active assignments.
How enabling a single vulnerable feature removed the entire network and identity perimeter around internet-isolated Azure Cognitive Search instances.
An attempt to better understand the security implications of cloud administrative assets.
Investigating legacy permissions.
Bypassing assignment, eligibility and activation requirements.
Escalating to Global Admin via eligible assignments.
Escalating to Global Admin via active assignments.
How trusting container images may allow threat actors to spread in container-based infrastructures like Kubernetes.
An attempt to better understand the security implications of cloud administrative assets.
Investigating legacy permissions.
Bypassing assignment, eligibility and activation requirements.
Escalating to Global Admin via eligible assignments.
Escalating to Global Admin via active assignments.
How trusting container images may allow threat actors to spread in container-based infrastructures like Kubernetes.
An attempt to better understand the security implications of cloud administrative assets.
Investigating legacy permissions.
Bypassing assignment, eligibility and activation requirements.
Escalating to Global Admin via eligible assignments.
Escalating to Global Admin via active assignments.
An attempt to better understand the security implications of cloud administrative assets.
Investigating legacy permissions.
Bypassing assignment, eligibility and activation requirements.
Escalating to Global Admin via eligible assignments.
Escalating to Global Admin via active assignments.
How trusting container images may allow threat actors to spread in container-based infrastructures like Kubernetes.
How a few common misconceptions about vulnerability patching and detection in software containers can give a false sense of security, and cause you to potent...
How trusting container images may allow threat actors to spread in container-based infrastructures like Kubernetes.
How a few common misconceptions about vulnerability patching and detection in software containers can give a false sense of security, and cause you to potent...
How trusting container images may allow threat actors to spread in container-based infrastructures like Kubernetes.
How a few common misconceptions about vulnerability patching and detection in software containers can give a false sense of security, and cause you to potent...
How trusting container images may allow threat actors to spread in container-based infrastructures like Kubernetes.
How a few common misconceptions about vulnerability patching and detection in software containers can give a false sense of security, and cause you to potent...
How a few common misconceptions about vulnerability patching and detection in software containers can give a false sense of security, and cause you to potent...
How a few common misconceptions about vulnerability patching and detection in software containers can give a false sense of security, and cause you to potent...
How enabling a single vulnerable feature removed the entire network and identity perimeter around internet-isolated Azure Cognitive Search instances.
How enabling a single vulnerable feature removed the entire network and identity perimeter around internet-isolated Azure Cognitive Search instances.
How trusting container images may allow threat actors to spread in container-based infrastructures like Kubernetes.
How trusting container images may allow threat actors to spread in container-based infrastructures like Kubernetes.
An attempt to better understand the security implications of cloud administrative assets.
An attempt to better understand the security implications of cloud administrative assets.