Azure Key Vault Tradecraft with BARK

Azure Key Vault Tradecraft with BARK

BriefThis post details the existing and new functions in BARK that support adversarial tradecraft research relevant to the Azure Key Vault service. The latter part of the post shows an example of ...

Microsoft’s August Security Update on High-Risk Vulnerabilities in Multiple Products

Overview On August 14, NSFOCUS CERT detected that Microsoft released a security update patch for August, which fixed 90 security issues involving widely used products such as Windows, Microsoft Office, Visual Studio ...
Hybrid Attack Paths, New Views and your favorite dog learns an old trick

Hybrid Attack Paths, New Views and your favorite dog learns an old trick

Introducing Hybrid Attack PathsDeath from Above: An Attack Path from Azure to Active Directory With BloodHoundWhen we introduced Azure Attack Paths into BloodHound, they were added as a completely separate sub-graph. At no ...
Critical Microsoft Zero-Day Vulnerability Exploited in the Wild for Over a Year

Critical Microsoft Zero-Day Vulnerability Exploited in the Wild for Over a Year

A severe zero-day vulnerability in Microsoft Windows, tracked as CVE-2024-38112, has been actively exploited by threat actors for at least 18 months. This security flaw in the Windows MSHTML Platform allows remote ...

Microsoft’s Security Update in July of High-Risk Vulnerabilities in Multiple Products

Overview On July 10, NSFOCUS CERT detected that Microsoft released a security update patch for July, which fixed 139 security issues involving Windows, Microsoft SQL Server, Microsoft Office, Azure and other widely ...
How Privileged Identity Management Affects Conditional Access Policies

How Privileged Identity Management Affects Conditional Access Policies

| | azure, Entra
IntroductionWhen administrators use directory roles (aka Entra ID roles) when configuring Conditional Access Policies (CAPs), users are not included in the enforcement of that CAP until after that user’s role assignment is ...
Accelerating CMMC 2.0 Compliance for Defense Contractors with Microsoft Azure

Accelerating CMMC 2.0 Compliance for Defense Contractors with Microsoft Azure

Microsoft Azure provides a suite of highly integrated security services that provide a cost-effective solution for Defense contractors looking to meet the CMMC 2.0 requirements. The Cybersecurity Maturity Model Certification (CMMC) is ...