Aggregator
Locksmith: identify & remediate common misconfigurations in AD Certificate Services
Locksmith A tiny tool to identify and remediate common misconfigurations in Active Directory Certificate Services. Mode 0 (Default) – Identify Issues and Output to Console PS> .\Invoke-Locksmith.ps1 Running Invoke-Locksmith.ps1 with no parameters or -Mode 0 will...
The post Locksmith: identify & remediate common misconfigurations in AD Certificate Services appeared first on Penetration Testing Tools.
公安部发布等保工作说明函,流行AI开发工具曝严重漏洞|一周特辑
公安部发布等保工作说明函,流行AI开发工具曝严重漏洞|一周特辑
公安部发布等保工作说明函,流行AI开发工具曝严重漏洞|一周特辑
How to rationalize IDPs (without painful migrations)
For enterprise CIOs, CISOs, and IT leaders, managing multiple identity providers (IDPs) is a costly, complex, and security-intensive challenge. Whether due to M&A activities, multi-cloud strategies, or regulatory requirements, fragmented identity ecosystems drive up expenses, increase security risks, and hinder operational efficiency. Why organizations run multiple identity providers Large enterprises often run multiple Identity Providers...
The post How to rationalize IDPs (without painful migrations) appeared first on Strata.io.
The post How to rationalize IDPs (without painful migrations) appeared first on Security Boulevard.
LEAF: Linux Evidence Acquisition Framework
Linux Evidence Acquisition Framework (LEAF) Linux Evidence Acquisition Framework (LEAF) acquires artifacts and evidence from Linux EXT4 systems, accepting user input to customize the functionality of the tool for easier scalability. Offering several modules...
The post LEAF: Linux Evidence Acquisition Framework appeared first on Penetration Testing Tools.
Building IDP Resilience
In today’s digital economy, identity is more than just an authentication checkpoint—it’s the backbone of user access, security, and continuity. And as CISOs and IAM architects work to modernize their identity systems, one imperative has moved from the sidelines to center stage: IDP resilience. When identity becomes a single point of failure Most enterprises are...
The post Building IDP Resilience appeared first on Strata.io.
The post Building IDP Resilience appeared first on Security Boulevard.
CVE-2020-5289 | Elide up to 4.5.13 improper authorization (GHSA-2mxr-89gf-rc4v)
CVE-2020-10696 | Buildah up to 1.14.4 Container Image path traversal (Nessus ID 208637)
CVE-2019-10180 | pki-core 10.x.x Token Processing Service Parameter Stored cross site scripting (RHSA-2021:0947 / Nessus ID 210283)
Daily Dose of Dark Web Informer - 9th of May 2025
CVE-2020-4235 | IBM Tivoli Netcool Impact up to 7.1.0.17 Web UI cross site scripting (XFDB-175408)
CVE-2020-4237 | IBM Tivoli Netcool Impact up to 7.1.0.17 cross-site request forgery (XFDB-175410)
CVE-2020-4238 | IBM Tivoli Netcool Impact up to 7.1.0.17 cross-site request forgery (XFDB-175411)
CVE-2020-5291 | Bubblewrap up to 0.4.0 Permission incorrect privileged apis
CVE-2020-5292 | Leantime up to 2.0.14/2.1-beta2 searchUsers sql injection
Microsoft Listens to Security Concerns and Delays New OneDrive Sync
Misuse of the newly announced Microsoft OneDrive synchronization feature puts corporate security and personal privacy at serious risk in ways not likely understood by the users. Microsoft wants people to connect their personal OneDrive file share with their work systems, synchronizing potentially private files onto their enterprise managed PCs.
The problem is having these files copied to enterprise machines could be an avenue for attackers, by bringing in malware, a means to exfiltrate corporate data, and also undermine the personal privacy of unsuspecting users! Evan Schuman has written a timely article in CSO, articulating many of the risks that both users and employers should avoid.
The industry pushback was immediate and it looks like Microsoft is listening. They are delaying the release, probably to better understand the potential risks. I expect they will now do an internal review with security minded people — which is what should have happened beginning at the architecture phase!
My guess is when the dust settles, they will not enable the synchronization feature by default, but require enterprise admins to turn it on before the users see the approval prompt.
Well, that is my hope anyways!
Microsoft’s approach in not fully understanding the cybersecurity ramifications of new features is not new. The highly controversial Recall feature also experienced similar backlash, causing it to be delayed and ultimately abandoning the plans to turn it on by default.
As we watch Microsoft reconsider its OneDrive synchronization rollout, it serves as a reminder for all software, device, and service providers: security and privacy must be foundational, not afterthoughts, in product design. Rushing features to market without fully understanding cybersecurity aspects beyond technical vulnerabilities can expose customers to unnecessary risks. As an industry, we must drive a culture-shift where cybersecurity is part of the development process from the outset to preserve and enhance trust.
The post Microsoft Listens to Security Concerns and Delays New OneDrive Sync appeared first on Security Boulevard.