Tagged: CyberSecurity

Azure Blob Storage PowerShell Scanning Script

Azure Blob Containers are meant to be opened…

The cloud’s capabilities, particularly security, are expanding and bringing impressive value. However, old misconfigurations still occur even in the most hardened and monitored environments, one of which is an open Azure Blob … Read the rest

The Power of Promptbooks: A Closer Look at Copilot for Security Promptbook

Copilot for Security provides a natural language and assistive copilot experience. It helps support security professionals in end-to-end scenarios such as incident response, threat hunting, intelligence gathering, and posture management.

Designed with integration, Copilot for Security offers a standalone experience … Read the rest

Cloud Penetration Testing from the field

Breaking the Cloud via “some service” is every pentester or red reamer mission. While the Blue team, SecOps, and other security teams struggle to minimize the attack surface area, create friction with attackers, and gain more visibility. The other teams, … Read the rest

Be the Purple with Generative AI

If you are interested in artificial intelligence, natural language processing, or cybersecurity, you might have heard of ChatGPT. It is a state-of-the-art language generation model that can produce realistic and coherent text on almost any topic. But what does ChatGPT … Read the rest

Defender TI

Investigation in Defender TI

While investigating an incident, we aim to find the campaign, the attackers, and who is behind the attack – in this situation, Context is Everything.

Threat intelligence plays a critical role in many scenarios; an incident investigation is one of … Read the rest

Recon Azure AD

Can you monitor or prevent a reconnaissance or enumeration? Especially reconnaissance (recon) on the cloud? Mostly not, and it depends on the recon types. While recon for local (on-premises) resources can be challenging or more accessible (depends). The cloud recon … Read the rest