What is IdaaS?
You have heard it said that attackers will take the least path of resistance and…
Two factor authentication (2FA) has been for some time (and still is) a highly recommended security control for authentication. After all, 2FA does help prevent attackers from just simply using stolen credentials to login and gain…
As a current red teamer (and a former blue teamer), I have seen unauthenticated Jenkins abused in various environments. These instances of unauthenticated Jenkins provide initial access points which often lead to additional access. It is not uncommon to find unauthenticated Jenkins…
In modern IT environments today, mixed Windows/Linux/Mac environments is the norm. JAMF Pro is quickly becoming the standard for enterprise management of Apple devices. Therefore, I thought it would be helpful to briefly point out some simple things that can be done to help…
Welcome to my first post! I am a career blue teamer turned red teamer a few…