Mar 24 · 4 min read · 📋 Top Headlines at a Glance RSA ID Plus Sovereign Deployment delivers full-stack identity for high-risk environments North Korea-linked threat actors abuse VS Code auto-run to spread StoatWaffle malware U.S. Sentences Russian Hacker to 6.75 Years ...
Join discussion
Mar 13 · 15 min read · This post explores a specific hybrid identity scenario: taking a group synchronized from Active Directory Domain Services (AD DS), changing its Source of Authority (SOA) to Microsoft Entra, and then u
Join discussion
Mar 8 · 2 min read · Introduction This article discusses my personal journey in transitioning from stateful to stateless SSO(Single Sign on) service where user details and password storage is not required. All modern SaaS
Join discussionMar 1 · 6 min read · OAuth 2.0 Token Exchange is a mechanism that allows a client to exchange one valid access token for another, potentially with different scopes or audiences. This is particularly useful in microservices architectures where services need to communicate...
Join discussionFeb 19 · 2 min read · Let me ask you a serious question: If someone could buy your email, your passwords, your bank details, your identity… How much do you think it would cost? $10,000?$5,000?$800? Try something closer to the price of lunch. The Shocking Truth In undergro...
Join discussion
Jan 29 · 6 min read · Reconnaissance has always been the foundation of offensive security. Before exploitation, before payloads, before privilege escalation, there is recon. What has changed is not the importance of recon, but its nature. The image above represents a new ...
Join discussion
Jan 19 · 2 min read · A rápida expansão da Internet das Coisas (IoT) transformou indústrias, cidades e lares. No entanto, essa conectividade trouxe um efeito colateral perigoso: uma superfície de ataque sem precedentes. Durante anos, a segurança de rede baseou-se no model...
Join discussion