Layth Chebbi's Avatar

Layth Chebbi

@laythchebbi.com.bsky.social

The Multi-Cloud Security Engineer | Ethical Hacker | Solutions Architect | Microsoft Azure & AWS Certified | EC Council Certified

719 Followers  |  541 Following  |  26 Posts  |  Joined: 04.11.2023  |  1.9422

Latest posts by laythchebbi.com on Bluesky

Preview
Claude now available in Microsoft 365 Copilot Claude models are now available in Microsoft 365 Copilot, bringing Claude to millions of enterprise users through Microsoft's productivity platform.

Claude Sonnet 4 and Opus 4.1 are now available in Microsoft 365 Copilot, bringing Claude’s advanced reasoning capabilities to millions of enterprise users.

www.anthropic.com/news/claude-...

24.09.2025 19:23 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Preview
Azure Service Groups: Finally, Resource Organization That Makes Business Sense - Layth CHEBBI Share this… Facebook Twitter Linkedin Telegram Messenger Hackernews Service Groups Architecture Overview Service Groups Deep Dive Infrastructure Perspective Definition and PurposeAzure Service Groups ...

After years of wrestling with Azure's rigid subscription hierarchy, I'm genuinely excited about Service Groups.
Wrote up a practical guide with PowerShell labs that you can run in 30 minutes.
#AzureServiceGroups #CloudGovernance #Azure #ResourceGroups #Microsoft
laythchebbi.com/2647-2/

13.09.2025 14:06 β€” πŸ‘ 2    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0

The ironic tragedy is life has to be lived forward but only makes sense in reverse

04.06.2025 19:43 β€” πŸ‘ 4    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Preview
Calculated Chaos: The Strategic Value of Moving Target Defense in Azure Security - Layth CHEBBI Share this… Facebook Twitter Linkedin Telegram Messenger Hackernews 1. Introduction Cybersecurity for cloud environments has traditionally relied on static defenses firewalls, access controls, and per...

Just published a new article exploring how Moving Target Defense (MTD) can significantly enhance cloud security in Microsoft Azure. Learn how dynamic strategies can disrupt attackers and build a more resilient environment.
laythchebbi.com/calculated-c...
#CloudSecurity #Cybersecurity #mtd

12.04.2025 13:09 β€” πŸ‘ 7    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Preview
Denial-of-Wallet Attacks: How Unauthorized Cloud Access Can Empty Your Budget And Ruin Your Life. - Layth CHEBBI Share this… Facebook Twitter Linkedin Telegram Messenger Hackernews Introduction Storage services like Microsoft Azure Storage Accounts and Amazon S3 buckets offer scalability, durability, and ease of...

My New article: "Denial-of-Wallet Attacks" reveals how unauthorized API calls to Azure and AWS can drain your budget with runaway bills.
Learn how to protect your cloud spending.
Read more: laythchebbi.com/denial-of-wa...
#CloudSecurity #AWS #Azure #DenialOfWallet #CloudBilling

09.04.2025 10:56 β€” πŸ‘ 2    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Post image

I've successfully renewed my Microsoft Certified: Cybersecurity Architect Expert certification. The renewal process was a nice refresher on advanced security architectures and cloud protection strategies. #MicrosoftCertified #Cybersecurity #sc100

18.03.2025 14:55 β€” πŸ‘ 3    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Post image 22.02.2025 19:09 β€” πŸ‘ 3    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Preview
Your Data, Your Rules: Enforcing Privacy with Azure Private Endpoints - Layth CHEBBI Share this… Facebook Twitter Linkedin Telegram Messenger Hackernews Introduction When your data travels over the public internet, it’s exposed to risksβ€”interception, breaches, and unauthorized access....

πŸ”’ Keep cloud data OFF the public internet! Azure Private Endpoints use private IPs only. This guide breaks down:
βœ… Why they’re essential
βœ… How they work
βœ… Quick setup steps
Secure your flow! πŸ‘‡
laythchebbi.com/your-data-yo...
#CloudSecurity #AzureTips #DataPrivacy

22.02.2025 19:06 β€” πŸ‘ 1    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Preview
Automating Azure Security: Why DSC Is Your Silent Guardian Against Configuration Drift Introduction Many organizations today overlook the critical role of Desired State Configuration (DSC) in safeguarding cloud infrastructure, often underestimating its ability to prevent misconfiguratio...

Configuration drift leaving your Azure vulnerable?
My new article explores how Azure DSC automates security & enforces policies! πŸ›‘οΈ
laythchebbi.com/index.php/20...
#Azure #DSC #Security #ConfigurationManagement

15.02.2025 23:33 β€” πŸ‘ 3    πŸ” 1    πŸ’¬ 0    πŸ“Œ 0
Preview
AWS Certified Cloud Practitioner was issued by Amazon Web Services Training and Certification to Layth Chebbi. Earners of this certification have a fundamental understanding of IT services and their uses in the AWS Cloud. They demonstrated cloud fluency and foundational AWS knowledge. Badge owners are able to ...

🌟 Excited to Share a Milestone! 🌟
I’m thrilled to announce I’ve passed the AWS Cloud Practitioner exam! πŸŽ‰ Coming from a strong Microsoft Azure background, this is my first step into
@awscloud.bsky.social credly.com/badges/c4236... via @credly

22.01.2025 09:07 β€” πŸ‘ 3    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Post image 14.01.2025 21:39 β€” πŸ‘ 5    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Post image

I'm excited to kick off the new year by renewing my Microsoft Azure Security Engineer Certification! πŸ’ͺπŸ”’

#AzureSecurity #CloudSecurity #MicrosoftCertified #Cybersecurity #Azure

11.01.2025 21:24 β€” πŸ‘ 2    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0

Thanks!

23.12.2024 22:47 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Post image Post image Post image


Check out my Azure workbook, "Storage Account Security Posture" on GitHub github.com/laythchebbi/...
It provides an overview of security configurations for storage accounts in your Azure environment.
#azure #security #workbook #microsoft #storageaccount

12.12.2024 11:34 β€” πŸ‘ 13    πŸ” 2    πŸ’¬ 1    πŸ“Œ 0
Preview
Azure Infiltrated: How Attackers Exploit Misconfigured Environments to Breach Data and Cause Damage Introduction Cloud computing has become increasingly popular among enterprises, corporations, and individuals, providing an easy way to deploy projects without the need for infrastructure maintenance,...

Ever wondered how attackers exploit misconfigured Azure environments? I've created a step-by-step lab to show exactly how breaches happen and how to prevent them!
Read now πŸ‘‰ laythchebbi.com/index.php/20...
#azure #cloudcecurity #microsoft #cyberchreats #cyberSecurity #datasecurity #infosec

28.11.2024 20:27 β€” πŸ‘ 7    πŸ” 3    πŸ’¬ 0    πŸ“Œ 0
Preview
Effortless Email Archiving Saving Sent Emails on Server with Laravel IMAP Effortlessly archive sent emails on your server with Laravel IMAP. Seamlessly integrate email archiving into your Laravel app to keep sent emails secure and easily accessible.

Archive Sent Emails on Laravel easily.
#php #laravel #imap
koossaayy.tn/effortless-e...

28.11.2024 18:22 β€” πŸ‘ 2    πŸ” 1    πŸ’¬ 0    πŸ“Œ 0
Preview
Privilege escalation using Azure Service principal Introduction In Microsoft Azure, the management of access and permissions is critical for maintaining a secure environment. Azure Service Principals serve as non-human identities that allow applicatio...

In this blog post i breaks down how attackers can exploit and abuse service principals and what you can do to defend against it.
Check it out here:
laythchebbi.com/index.php/20...
#AzureSecurity #PrivilegeEscalation #OffensiveSecurity #CloudSecurity #Cybersecurity

21.11.2024 10:35 β€” πŸ‘ 24    πŸ” 9    πŸ’¬ 0    πŸ“Œ 0

Thanks! πŸ™

19.11.2024 09:44 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0

Thrilled to see my article on Protecting Against Token Theft in Microsoft Entra ID featured in this week’s Entra ID Newsletter by @merill.net ! πŸŽ‰
If you’re into identity security, don’t miss it. πŸ›‘οΈ Check out the latest edition
Big thanks to Merill for including my work! πŸ™Œ

18.11.2024 19:31 β€” πŸ‘ 7    πŸ” 1    πŸ’¬ 0    πŸ“Œ 0
Preview
Azure Policy Anatomy What is Azure Policy Azure Policy is a service in Microsoft Azure that enforces organizational standards and evaluates compliance at scale. It allows users to create, assign, and manage policies to en...

If you want to learn about Azure Policy, understand its functionality, and how it can benefit you in terms of security governance or financially, check out this article
laythchebbi.com/index.php/20...
#microsoft #azure #azurepolicy #security πŸŒπŸ“·

17.11.2024 17:18 β€” πŸ‘ 9    πŸ” 3    πŸ’¬ 0    πŸ“Œ 0
Preview
7 things to know about Bluesky before you join - and why you should It's not a direct replacement for Twitter (X), but Bluesky has a lot to offer those who want a fresh start in a decentralized, privacy-minded network.

This article talks about their monetization plans and future plans
www.zdnet.com/article/7-th...

17.11.2024 14:57 β€” πŸ‘ 1    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0


Thanks!
Yes, token protection in Microsoft Entra ID applies to devices managed through Intune Mobile Device Management (MDM).

17.11.2024 13:17 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0

The supported apps include Microsoft 365 apps (e.g., Word, Excel, and Outlook), as well as Exchange Online for scenarios involving app logins. You’re correct that these apps are not perpetual but subscription-based, and they are indeed supported as part of Microsoft 365.

17.11.2024 13:14 β€” πŸ‘ 1    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Preview
Protect against token theft in Microsoft Entra ID How Token Generation and Authentication Work? Token generation and authentication in Entra ID involve a sophisticated process designed to secure user identities and control access to resources. Unders...

In this article, I explore the vital aspects of token generation and authentication within Microsoft Entra ID.
laythchebbi.com/index.php/20...
#Cybersecurity #CloudSecurity #EntraID #TokenProtection #MFA #Authentication #InfoSec

16.11.2024 18:41 β€” πŸ‘ 66    πŸ” 8    πŸ’¬ 2    πŸ“Œ 0
Post image

Microsoft PowerToys just got a whole lot more powerful! πŸš€
Introducing New+, the latest feature that lets you create files and folders from your favorite templates right from the File Explorer context menu. 🀯
learn.microsoft.com/en-us/window...
#PowerToys #New+ #Productivity #Windows #Microsoft #Tech

13.11.2024 21:01 β€” πŸ‘ 8    πŸ” 2    πŸ’¬ 0    πŸ“Œ 0
Preview
Secure VM Access using Azure Bastion Introduction In the cloud, security is a top priority. While Azure Virtual Machines (VMs) offer scalable and flexible computing power, improper configurationβ€”especially when exposing VMs directly to t...

πŸ”’Just published: How to Secure Azure VMs Using Azure Bastion! πŸš€ Discover the risks of exposing VMs to the internet and how Bastion keeps them safe. Don’t leave your cloud vulnerableβ€”get the details here: laythchebbi.com/index.php/20...
#Azure #CloudSecurity #AzureBastion #CyberSecurity

12.11.2024 12:46 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Preview
Secure, Compliant, and User-Friendly: The Power of Dynamic Data Masking in Azure SQL Database Introduction With data breaches making headlines almost every day, organizations are increasingly prioritizing data security, especially for sensitive information. In cloud databases like Azure SQL Da...

Just published a new blog post πŸŽ‰
Learn how Dynamic Data Masking (DDM) in Azure SQL helps limit data exposure for non-privileged users.
laythchebbi.com/index.php/20...
#AzureSQL #DataSecurity #DynamicDataMasking #CloudSecurity

11.11.2024 18:47 β€” πŸ‘ 0    πŸ” 1    πŸ’¬ 0    πŸ“Œ 0

@laythchebbi.com is following 18 prominent accounts