Explore >> Select a destination


You are here

aadinternals.com
| | www.cloudpartner.fi
8.5 parsecs away

Travel
| | And to the next section from SC-300 study guide, now covering: implement and manage Azure Active Directory Connect (AADC)implement and manage Azure AD Connect cloud syncimplement and manage Passwor...
| | www.appgovscore.com
14.7 parsecs away

Travel
| | Here are steps you can follow to identify which apps use the Microsoft Graph API to send emails and how to restrict them to send only from the email addresses to which you give them permissions.
| | blog.xpnsec.com
12.5 parsecs away

Travel
| | Originally presented at SOCON-2024, and continuing the series into post-exploitation techniques against Identity Providers, in this blog post we'll look at Ping, OneLogin and Entra ID. I'll discuss how post-exploitation techniques effective against Okta apply to other providers, release new tools for post-exploitation, and look at what proves to be effective when critical assets lie beyond an Identity Provider portal.
| | thehackernews.com
54.5 parsecs away

Travel
| Fake Android apps mimicking popular platforms like Google & WhatsApp are stealing user data.