The Role of the SOC in DevSecOps
There are many buzzes, topics, areas, and responsibilities to take care of in every environment – SIEM, SOC, DevSecOps, Cloud-Native Security, App Risk, App Sec. WOW. This post focuses on The Role of the SOC...
Just another day of IR, Threat-Hunting & Microsoft Security
There are many buzzes, topics, areas, and responsibilities to take care of in every environment – SIEM, SOC, DevSecOps, Cloud-Native Security, App Risk, App Sec. WOW. This post focuses on The Role of the SOC...
This post focus on how to Pass the CA. Pass-the-CA is the way to bypass Azure AD Conditional Access policies. Currently, there are four techniques to avoid CA policies, and the following one in this...
The following post Azure Sentinel Tables and Structure, describe the table and structure in Azure Sentinel. Azure Sentinel Data is based on Azure Log Analytics, and this is similar to Azure Monitor itself. Data in...
One of the areas that Amazon Web Services certainly excels at is in providing options for its customers. This is evident by visiting the AWS Products and Services page and reviewing the wide array of...
Microsoft states that everything that you can do through the Azure portal is possible to accomplish with PowerShell as well. This becomes possible because Microsoft has built the new portal on top of the Microsoft...
Microsoft cloud services, especially the Office 365 service, are under attack at all times. Every day, customers experience various sophisticated and varied attacks, whether at the level of identities or phishing. The following Block ONMICROSOFT...