 
      
    | You are here | www.hecfblog.com | ||
| | | | | www.matano.dev | |
| | | | | We're adding support for pulling logs and enrichment data from identity and auth sources to your Matano data lake. This means you can query failed/successful sign-in attempts, view audit logs, and query user information from popular SaaS sources directly using SQL and write detection rules to detect threats in realtime using Python! | |
| | | | | www.hunters.security | |
| | | | | Explore how attackers exploit Azure Managed Identities (SAMI & UAMI) for lateral movement, privilege escalation, and data exfiltration in cloud environments. | |
| | | | | o365blog.com | |
| | | | | The toolkit for Azure AD hackers, bounty hunters, red/blue teamers | |
| | | | | goggleheadedhacker.com | |
| | | Sodinokibi is a Ransomware-as-a-Service provider that has been covered in the news quite a bit recently. This article takes a deep-dive analysis into the inner workings of how the ransomware operates. It will focus on technical details such as how encryption keys are generated and how files are encrypted. | ||