Tag: sensitive permissions
-
Cloud Blog: (In)tuned to Takeovers: Abusing Intune Permissions for Lateral Movement and Privilege Escalation in Entra ID Native Environments
Source URL: https://cloud.google.com/blog/topics/threat-intelligence/abusing-intune-permissions-entra-id-environments/ Source: Cloud Blog Title: (In)tuned to Takeovers: Abusing Intune Permissions for Lateral Movement and Privilege Escalation in Entra ID Native Environments Feedly Summary: Written by: Thibault Van Geluwe de Berlaere, Karl Madden, Corné de Jong The Mandiant Red Team recently supported a client to visualize the possible impact of a compromise by…
-
CSA: AWS AI Services: Protecting Sensitive Permissions
Source URL: https://sonraisecurity.com/blog/safeguarding-aws-ai-services-protecting-sensitive-permissions/ Source: CSA Title: AWS AI Services: Protecting Sensitive Permissions Feedly Summary: AI Summary and Description: Yes Summary: The text discusses the importance of securing AI services, particularly those provided by AWS, as organizations increasingly adopt generative AI solutions. It highlights multiple sensitive permissions related to various AWS AI services and their associated…
-
CSA: June 2024: New AWS Sensitive Permissions & Services
Source URL: https://sonraisecurity.com/blog/june-recap-new-aws-sensitive-permissions-and-services/ Source: CSA Title: June 2024: New AWS Sensitive Permissions & Services Feedly Summary: AI Summary and Description: Yes Summary: The text provides an analysis of new sensitive AWS permissions introduced in June, highlighting the implications for security and access control. This information is crucial for security professionals to adapt their monitoring and…