cybersecurity

How I Dorked My Way Into …

Images in this post generated by Microsoft Copilot and ChatGPT This is a personal blog and all content therein is my personal opinion and not that of my employer. Introduction In this post, I’m going to talk about some topics that may or may not be new to you, how they led to me finding some …

Becoming a First-Time …

Cover image generated by ChatGPT Becoming a First-Time Author and Pivoting in Your Career Life often takes us on journeys we never planned. If you’d asked me a few years ago whether I’d become a published author, I would have laughed. Yet, here I am, reflecting on my experience co-authoring the …

What are shadow admins in …

Cover Photo by David East on Unsplash Introduction In this post, I’m going to talk about a concept you may have heard of (shadow admins), what they are, why they are a problem you need to care about, and what to do about them. What is a shadow admin? The name should be fairly self explanatory …

Becoming a Microsoft …

Cover Photo by National Cancer Institute on Unsplash Introduction In this post, I’m going to talk about becoming a Microsoft Security Researcher. I mentioned this in my last post. I sort of brushed over it but when I was speaking to one of my colleagues and friends about the post just before I …

Azure Linux VM Agent …

Cover Photo by Joe Zlomek on Unsplash In this post, I’m going to talk about something that I discovered whilst working on a project a little while ago, some default behaviour in the Microsoft Azure Linux VM Agent which can lead to credential/secret leakage in your linux VM. What is the Azure …

Security Bytes: What is …

Welcome to the latest of my Security Bytes posts, where I dig into areas of interest in Infosec/CyberSec, and offer my opinion. In my last post, I talked about the many challenges of implementing Least Privilege. You may have been forgiven for thinking this is all just too hard to do right from day …