cybersecurity

Images in this post generated by Microsoft Copilot This is a personal blog and all content therein is my personal opinion and not that of my employer. Introduction In this post, I’m going to talk about Summary As ever, thanks for reading and feel free to leave comments down below! If you like …

Becoming a First-Time Author and Pivoting in Your Career
Becoming a First-Time …

Cover image generated by ChatGPT Becoming a First-Time Author and Pivoting in Your Career Life often takes us on journeys we never planned. If you’d asked me a few years ago whether I’d become a published author, I would have laughed. Yet, here I am, reflecting on my experience co-authoring the …

What are shadow admins in Windows, why should you care and what can you do about them?
What are shadow admins in …

Cover Photo by David East on Unsplash Introduction In this post, I’m going to talk about a concept you may have heard of (shadow admins), what they are, why they are a problem you need to care about, and what to do about them. What is a shadow admin? The name should be fairly self explanatory …

Becoming a Microsoft Security Researcher
Becoming a Microsoft …

Cover Photo by National Cancer Institute on Unsplash Introduction In this post, I’m going to talk about becoming a Microsoft Security Researcher. I mentioned this in my last post. I sort of brushed over it but when I was speaking to one of my colleagues and friends about the post just before I …

Azure Linux VM Agent leaks secrets || How to harden your config
Azure Linux VM Agent …

Cover Photo by Joe Zlomek on Unsplash In this post, I’m going to talk about something that I discovered whilst working on a project a little while ago, some default behaviour in the Microsoft Azure Linux VM Agent which can lead to credential/secret leakage in your linux VM. What is the Azure …

Security Bytes: What is Least Privilege and why you should care about it - Lets fix this
Security Bytes: What is …

Welcome to the latest of my Security Bytes posts, where I dig into areas of interest in Infosec/CyberSec, and offer my opinion. In my last post, I talked about the many challenges of implementing Least Privilege. You may have been forgiven for thinking this is all just too hard to do right from day …