-
Bug bounty - Cybersecurity subcontractor exposes business data to other customers
-
Azure Update Management - Part 8 - Security patches on CentOS machines!
This post is describes the architecture of the solution
-
Azure Update Management - Part 7 - Security patches on Azure ARC!
This post is describes the architecture of the solution
-
Azure security - Internal recon leveraging lack of access control
A non critical lack of access control in Azure Identity API makes easier SharePoint sites enumeration.
-
Azure Update Management - Part 6 - Monitoring
This post is describes the architecture of the solution
-
Azure Update Management - Part 5 - Automation accounts
This post is describes the architecture of the solution
-
Azure Update Management - Part 4 - Log Analytics agents
This post is describes the architecture of the solution
-
Azure Update Management - Part 3 - Deploy Azure ARC
This post is describes the architecture of the solution
-
Azure Update Management - Part 2 - Azure Policy
This post describes how to implement Azure policies
-
Azure Update Management - Part 1 - Architecture
This post is describes the architecture of the solution