Blue Team Guide: Hunting & Defending Against Azure Managed Identity Abuse (Part 2)
A subreddit dedicated to Microsoft's Suite of Services, Products, and Games.
Blue Team Guide: Hunting & Defending Against Azure Managed Identity Abuse (Part 2)
This subreddit is for technical professionals to discuss cybersecurity news, research, threats, etc.
Detecting Azure Managed Identity Abuse: Threat Hunting Techniques
A subreddit dedicated to Microsoft's Suite of Services, Products, and Games.
Securing Azure: Deep Technical Dive into Managed Identities (Detection & Investigation)
A subreddit dedicated to Microsoft's Suite of Services, Products, and Games.
Azure Managed Identities Abuse: Security Research - Defense strategies
/r/netsec is a community-curated aggregator of technical information security content. Our mission is to extract signal from the noise — to provide value to security practitioners, students, researchers, and hackers everywhere.
Practical Blue Team Playbook: Azure Managed Identities Abuse & Detection
We focus on technical intelligence, research and engineering to help operational [blue|purple] teams defend their estates and have awareness of the world.
Threat Research: Detecting Azure Managed Identity Compromise in Cloud Environments
Cloud security is a major topic today. This sub is intended to focus on cloud security architecture and engineering issues, and to discuss how we are securing our Cloud environments, as well as how we can do so better.
How are you currently monitoring your MIs?
Join us in discord here: https://aka.ms/azurediscord.
T1, T2 SOC analyst roles and the future- thoughts?
This subreddit is for technical professionals to discuss cybersecurity news, research, threats, etc.
Thoughts on SOC Analyst role evolution with the introduction of AI/agentic AI
We focus on technical intelligence, research and engineering to help operational [blue|purple] teams defend their estates and have awareness of the world.
Thoughts on SOC Analyst role evolution with the introduction of AI/agentic AI
This subreddit is for technical professionals to discuss cybersecurity news, research, threats, etc.
What are your first 3 actions after detecting an infostealer?
This subreddit is for technical professionals to discuss cybersecurity news, research, threats, etc.
Infostealers are evolving – here's what we're seeing in the wild
This subreddit is for technical professionals to discuss cybersecurity news, research, threats, etc.
Analyzing the Abuse Potential of Azure Managed Identities Across ARM, Key Vault, and M365
Join us in discord here: https://aka.ms/azurediscord.
Analyzing the Abuse Potential of Azure Managed Identities Across ARM, Key Vault, and M365
This subreddit is for technical professionals to discuss cybersecurity news, research, threats, etc.
Analyzing the Abuse Potential of Azure Managed Identities Across ARM, Key Vault, and M365
At r/purpleteamsec, we believe that when Red and Blue teams unite, security becomes not just a goal but a shared journey. Join us today to connect, learn, and collaborate in the pursuit of a safer digital world. Your insights, experiences, and questions are all welcome here. Let's harness the power of Purple Teaming and protect what matters most! Remember, the future of cybersecurity is Purple. 💜
Analyzing the Abuse Potential of Azure Managed Identities Across ARM, Key Vault, and M365
A subreddit dedicated to Microsoft's Suite of Services, Products, and Games.
New Tool: Scan GitHub Actions Logs for Secret Exfiltration – CVE-2025-30066 (tj-actions, reviewdog)
A community for DevSecOps practitioners. Not a place to try and sell something.
GitHub Actions Supply Chain Attack (tj-actions & reviewdog) update: Team AXON dropped tools to detect secrets leaked via CVE-2025-30066 & CVE-2025-30154: - Secret Scanner - Log Fetcher (Linux/Win) Protect your repos
A subreddit to discuss GitHub's platform, products and features. Not affiliated with GitHub, Inc.
GitHub Actions Supply Chain Attack (tj-actions & reviewdog) update: Team AXON dropped tools to detect secrets leaked via CVE-2025-30066 & CVE-2025-30154: - Secret Scanner - Log Fetcher (Linux/Win) Protect your repos
This subreddit is for technical professionals to discuss cybersecurity news, research, threats, etc.
OBS Software used to execute infostealer via DLL Sideloading
We focus on technical intelligence, research and engineering to help operational [blue|purple] teams defend their estates and have awareness of the world.
OBS Software used to execute infostealer via DLL Sideloading
This subreddit is designed for users to post the latest Information Security related news and articles from around the Internet. The subreddit is intended to provide a location one can come and receive updated security news including security, privacy, and other security related industries or topics.
OBS Software used to execute infostealer via DLL Sideloading
A place for malware reports, analysis and information for [anti]malware professionals and enthusiasts.
OBS Software used to execute infostealer via DLL Sideloading
This subreddit is for technical professionals to discuss cybersecurity news, research, threats, etc.
VEILDrive: How Attackers are Using Microsoft OneDrive & Teams for C2, Bypassing Top EDRs with Simple Java Malware
A moderated community dedicated to all things reverse engineering.