Tagged: Security

macOS Forensics Artifacts and Commands

When conducting a digital forensic investigation on macOS systems, understanding where to find critical artifacts and how to extract meaningful data is crucial. Unlike Linux, macOS uses unique system components and logging mechanisms that require specialized knowledge. This post highlights … Read the rest

Azure Blob Storage PowerShell Scanning Script

Azure Blob Containers are meant to be opened…

The cloud’s capabilities, particularly security, are expanding and bringing impressive value. However, old misconfigurations still occur even in the most hardened and monitored environments, one of which is an open Azure Blob … Read the rest

EASM vs. PT vs. VM & Defender EASM Approaches

Many times people asked me about the differences between external attack surface management, vulnerability management, and penetration testing. Mostly “What will be the and the right approach to handling security tools alongside the behavior and procedures. While many organization has … Read the rest

Understanding Prompt Injection – GenAI Risks

In today’s AI landscape, software security is of paramount importance. With the increasing complexity of applications and the constant evolution of cyber threats, developers and security professionals must remain vigilant to protect sensitive data and prevent malicious attacks. As technology … Read the rest