Privacy VigilanteSecurity by Compliance: An Anti-PatternOrganizations with growing IT Governance programs often grapple with the interplay between compliance and security·3 min read·1 day ago--
Achim KochDoes my AEM have a backdoor?Authentication in AEM is centralized in Adobe IMS — with a few exceptions. Learn about these exceptions to harden your installation.9 min read·Mar 17, 2024--
Debashis SikdarSecure Unauthorized AWS Access by Ex-EmployeesHow to Secure Unauthorized AWS Access by Ex-Employees — 2024 (cloudautocraft.com)3 min read·21 hours ago----
ArunklinTheSecMasterHow to Disable TLS 1.0 and TLS 1.1 via Group PolicyWe have covered how to disable TLS 1.0 and TLS 1.1 on Windows Server in the previous post. That lets you know how to disable TLS protocols…3 min read·Mar 8, 2023----
Privacy VigilanteSecurity by Compliance: An Anti-PatternOrganizations with growing IT Governance programs often grapple with the interplay between compliance and security·3 min read·1 day ago--
Achim KochDoes my AEM have a backdoor?Authentication in AEM is centralized in Adobe IMS — with a few exceptions. Learn about these exceptions to harden your installation.9 min read·Mar 17, 2024--
Debashis SikdarSecure Unauthorized AWS Access by Ex-EmployeesHow to Secure Unauthorized AWS Access by Ex-Employees — 2024 (cloudautocraft.com)3 min read·21 hours ago--
ArunklinTheSecMasterHow to Disable TLS 1.0 and TLS 1.1 via Group PolicyWe have covered how to disable TLS 1.0 and TLS 1.1 on Windows Server in the previous post. That lets you know how to disable TLS protocols…3 min read·Mar 8, 2023--
lPaladin TEKOGenerating Dynamic Shellcode💻 for Windows x64 in Python🐍In this fucking article, I’m going to fuck up the advanced aspects of generating dynamic shellcode for Windows x64 using Python. This…12 min read·4 days ago--
Andreas LeicherinkotaicodeAWS IAM Roles for Kubernetes Pods in EKSAmazon Elastic Kubernetes Service (EKS) simplifies the deployment and management of Kubernetes clusters on AWS. As organizations transition…5 min read·Jan 19, 2024--
Chinmay SawantinGenerative AIGenerative AI: Key insights for Secure and Ethical use!Opportunities, Risks and Countermeasures for individuals and industries·8 min read·Jun 15, 2024--1