|
You are here |
aadinternals.com | ||
| | | | |
cyber-intruder.com
|
|
| | | | | This post is describes the architecture of the solution | |
| | | | |
thiebaut.dev
|
|
| | | | | In this blog post we will cover why rogue subscriptions are problematic and revisit a solution published a couple of years ago on Microsoft's Tech Community. Finally, we will conclude with some hardening recommendations to restrict the creation and importation of Azure subscriptions. | |
| | | | |
o365blog.com
|
|
| | | | | The toolkit for Azure AD hackers, bounty hunters, red/blue teamers | |
| | | | |
isovalent.com
|
|
| | | Isovalent Cilium for Enterprise is now available for EKS/EKS-A on AWS Marketplace! Read more and learn how to deploy in this blog post. | ||