pawelhaubusThe Day When the Earth Stood Still — CrowdStrike EditionUnless you were living under a rock last week, you either heard about or were affected by the CrowdStrike disaster that caused millions of…Jul 21
Supakiad S. (m3ez)inInfoSec Write-upsReflected XSS Leads to 3,000$ Bug Bounty Rewards from Microsoft FormsMicrosoft Forms Vulnerability: Reflected Cross-site Scripting (XSS)Jan 22, 20235
Jeffry GunawanMicrosoft Sentinel Series : Connect Your Free TAXII Pulsedive and Microsoft TIBack to my blog! Now, I will share easy step-by-step free MSTI and TAXII 2.1 Connector PulseDive to Microsoft Sentinel SIEM.Mar 3Mar 3
John BenavidesInstall & Configure Azure Monitor Agent (AMA) for Linux — Data Collection Rules & CEF CollectorWhat is the Azure Monitor Agent? 🤷🏽♂️Jul 19Jul 19
Craig ForshawDevOps Security with Microsoft Defender for CloudMicrosoft updated their DevOps security offering in Defender for cloud. Let’s take a look!Jan 24Jan 24
pawelhaubusThe Day When the Earth Stood Still — CrowdStrike EditionUnless you were living under a rock last week, you either heard about or were affected by the CrowdStrike disaster that caused millions of…Jul 21
Supakiad S. (m3ez)inInfoSec Write-upsReflected XSS Leads to 3,000$ Bug Bounty Rewards from Microsoft FormsMicrosoft Forms Vulnerability: Reflected Cross-site Scripting (XSS)Jan 22, 20235
Jeffry GunawanMicrosoft Sentinel Series : Connect Your Free TAXII Pulsedive and Microsoft TIBack to my blog! Now, I will share easy step-by-step free MSTI and TAXII 2.1 Connector PulseDive to Microsoft Sentinel SIEM.Mar 3
John BenavidesInstall & Configure Azure Monitor Agent (AMA) for Linux — Data Collection Rules & CEF CollectorWhat is the Azure Monitor Agent? 🤷🏽♂️Jul 19
Craig ForshawDevOps Security with Microsoft Defender for CloudMicrosoft updated their DevOps security offering in Defender for cloud. Let’s take a look!Jan 24
John BenavidesFilter CEF logs into Multiple Sentinel tables (Manage Firewall Ingestion)Why should we filter our logs? 🤷🏽♂️Jul 19
John GruberinGitBitEnable Conditional Access policies to block legacy authenticationMost compromising sign-in attempts come from legacy authentication.Jul 8