ATEAM - Azure Resource Attribution via Tenant ID Enumeration
                At DEF CON 33, NetSPI presented a talk about how Azure resources supporting Entra ID authentication expose tenant IDs, enabling attackers to attribute cloud resources to specific organizations at scal...
            
        
    
    
            New research from NetSPI from 
@kfosaaen.bsky.social & Thomas Elling reveals how Azure tenant IDs leaked through Entra ID authentication maps cloud resources to their owners.
Check out the new ATEAM tool for automated discovery.
Full technical breakdown: ow.ly/UOcu50WFzto
               
            
            
                14.08.2025 14:20 β π 0    π 0    π¬ 0    π 0                      
            
         
            
        
            
            
            
            
                                                
                                                
    
    
    
    
            New Azure App Services security research by NetSPI's @kfosaaen.bsky.social 
TL;DR: Users with Contributor permissions can extract & decrypt authentication tokens to impersonate other users accessing the application. 
Read more: ow.ly/tgUA50Wuqpb 
#Azure #CloudSecurity
               
            
            
                24.07.2025 13:04 β π 0    π 0    π¬ 0    π 0                      
            
         
            
        
            
            
            
            
                                                
                                                
    
    
    
    
            New Vuln Research: NetSPI Principal Consultant Ceri Coburn exposes how Forescout SecureConnector agents can be hijacked via a named pipe vulnerability (CVE-2025-4660), turning endpoint security tools into attacker-controlled C2 channels.
Read more: ow.ly/6hl250WqWrX
               
            
            
                17.07.2025 13:15 β π 0    π 0    π¬ 0    π 0                      
            
         
            
        
            
            
            
            
            
    
    
            
                            
                        
                Detecting Authorization Flaws in Java Spring via Source Code Review (SCR)
                Discover how secure code review catches privilege escalation vulnerabilities in Java Spring apps that pentests miss - identify insecure patterns early.
            
        
    
    
            NetSPI Security Consultant Mayuri Bochare has published an insightful deep-dive on securing Java Spring applications through code review. 
π Read the full article: ow.ly/IWfx50WnoVy 
#proactivesecurity #JavaSecurity #SecureCodeReview
               
            
            
                10.07.2025 13:42 β π 0    π 0    π¬ 0    π 0                      
            
         
            
        
            
            
            
            
            
    
    
            
                            
                        
                Set Sail: Remote Code Execution in SailPoint IQService via Default Encryption Key
                NetSPI discovered a remote code execution vulnerability in SailPoint IQService using default encryption keys. Exploit details, discovery methods, and remediation guidance included.
            
        
    
    
            NetSPI Principal Security Consultant Jason Juntunen recently published findings on a Remote Code Execution vulnerability in SailPoint's IQService component.
π Read the full technical breakdown: ow.ly/GbT150WmgRg
#proactivesecurity #VulnerabilityResearch
               
            
            
                08.07.2025 13:02 β π 1    π 2    π¬ 0    π 0                      
            
         
            
        
            
            
            
            
            
    
    
    
    
            Check out this new article published by @kfosaaen.bsky.social!
               
            
            
                02.07.2025 13:06 β π 1    π 0    π¬ 0    π 0                      
            
         
            
        
            
            
            
            
                                                
                                                
    
    
    
    
            Microsoft Defender for Identity vulnerability (CVE-2025-26685) allows unauthenticated attackers to capture Net-NTLM hashes and potentially gain AD access. Security tools can become attack vectors - understanding this risk is crucial: ow.ly/UOc050W8inY
               
            
            
                12.06.2025 12:10 β π 0    π 0    π¬ 0    π 0                      
            
         
            
        
            
            
            
            
                                                
                                                
    
    
    
    
            NetSPI's Sam Beaumont and Larry Trowell developed RayV Liteβa low-cost laser fault injection tool that makes advanced hardware security testing accessible beyond nation-states using open-source hardware & inexpensive IR-leaking lasers.
β‘οΈ  Read the full technical deep-dive: ow.ly/Nqtm50W4fjT
               
            
            
                04.06.2025 15:50 β π 0    π 0    π¬ 0    π 0                      
            
         
            
        
            
            
            
            
                                                
                                                
    
    
    
    
            Get the details on how multiple arbitrary SYSTEM file delete flaws (CVE-2025-23009, CVE-2025-23010) can be exploited for privilege escalation.  ow.ly/tTLj50W0xWS
β
 SonicWall has patched these issues in NetExtender v10.3.2
               
            
            
                29.05.2025 13:23 β π 0    π 0    π¬ 0    π 0                      
            
         
            
        
            
            
            
            
            
    
    
            
                            
                        
                NetSPI Agents at BSides Tokyo 2025
                Join NetSPI security experts at BSides Tokyo to learn how consumer-grade lasers can replicate nation-state optical hardware attacks.
            
        
    
    
            NetSPI's Sam Beaumont and Larry Trowell will demonstrate how low-cost hardware can be used to execute sophisticated optical attacks on computer chipsβattacks previously thought to require nation-state resources at BSides Tokyo on May 17, 2025!
Learn more: ow.ly/CcHM50VPqzU
               
            
            
                09.05.2025 14:04 β π 0    π 0    π¬ 0    π 0                      
            
         
            
        
            
            
            
            
            
    
    
            
                            
                        
                CVE-2025-27590 β Oxidized Web: Local File Overwrite to Remote Code Execution
                Learn about a critical security vulnerability (CVE-2025-27590) in Oxidized Web v0.14 that allows attackers to overwrite local files and execute remote code execution.
            
        
    
    
            CVE-2025-27590: Oxidized Web v0.14 vulnerability allows attackers to overwrite local files via /migration page, enabling remote code execution.
Read the article written by NetSPI's Jamie Riden & Jon O'Reilly to highlight the discovery, findings, & remediation of the vulnerability. ow.ly/HLwr50VxKJt
               
            
            
                10.04.2025 14:22 β π 0    π 0    π¬ 0    π 0                      
            
         
            
        
            
            
            
            
            
    
    
            
                            
                        
                A Not So Comprehensive Guide to Securing Your Salesforce Organization
                Explore key background knowledge on authorization issues and common bad practices developers may unintentionally introduce in Salesforce Orgs.
            
        
    
    
            The overall attack surface of Salesforce is often overlooked, and the result could be disastrous for your organization. ow.ly/CYZ350VrvEz
NetSPI's Weylon Solis wrote an article that explores authorization issues and common bad practices to avoid. Learn more!  
#salesforce #proactivesecurity
               
            
            
                31.03.2025 13:29 β π 0    π 0    π¬ 0    π 0                      
            
         
            
        
            
            
            
            
            
    
    
            
                            
                        
                CVE-2024-28989: Weak Encryption Key Management in Solar Winds Web Help Desk
                Learn how an attacker with access to a backup file could potentially recover certain encrypted passwords.
            
        
    
    
            An attacker with access to a Web Help Desk backup file could recover some encrypted passwords stored within it.
NetSPI Principal Security Consultant Jamie Riden wrote to tell about it. Check out his latest blog post to learn more: ow.ly/HFZC50VflwC
               
            
            
                11.03.2025 12:51 β π 0    π 0    π¬ 0    π 0                      
            
         
            
        
            
            
            
            
                                                
                                                
    
    
    
    
            Help us define the future of Trustworthy AI by contributing to our expanding benchmarks, from fairness to ethical alignment and beyond. Your insights could drive the next breakthroughs in balancing security and usability. ow.ly/S81y50Ux3nr
               
            
            
                16.01.2025 18:16 β π 1    π 0    π¬ 0    π 0                      
            
         
            
        
            
            
            
            
            
    
    
            
                            
                        
                Practical Methods for Decapping Chips
                Discover the intricate process of chip decapping, exposing secrets stored within snuggly layers of industrial epoxy, sleeping in beds of silicon.
            
        
    
    
            NetSPI Security Hardware Pentesting Team gives a starting point for those wanting to learn how to decap chips for optical viewing & reversal of integrated controller. 
Read the article: ow.ly/1hmZ50UGU3M
               
            
            
                15.01.2025 14:58 β π 0    π 0    π¬ 0    π 0                      
            
         
            
        
            
            
            
            
            
    
    
            
                            
                        
                Hijacking Azure Machine Learning Notebooks (via Storage Accounts)
                Abusing Storage Account Permissions to attack Azure Machine Learning notebooks
            
        
    
    
            How can security gaps can emerge in Azure Machine Learning?
@kfosaaen.bsky.social latest blog covers:
β’ Code execution via Storage Account permissions
β’ A privilege escalation bug (now fixed)
β’ A tool for automating credential dumping
Read the full blog π www.netspi.com/blog/technic...
               
            
            
                08.01.2025 15:08 β π 1    π 1    π¬ 0    π 0                      
            
         
            
        
            
            
            
            
                                                
                                                
    
    
    
    
            Tackling AI security and usability challenges requires collaboration across the community. Join us in shaping benchmarks that make AI safer and more effective for everyone. ow.ly/fNbk50UwxCM 
#artificialintelligence #LLM #securitybenchmark #proactivesecurity
               
            
            
                30.12.2024 14:26 β π 0    π 0    π¬ 0    π 0                      
            
         
            
        
            
            
            
            
            
    
    
            
                            
                        
                Exploiting Second Order SQL Injection with Stored Procedures
                Learn how to detect and exploit second-order SQL injection vulnerabilities using Out-of-Band (OOB) techniques, including leveraging DNS requests for data extraction.
            
        
    
    
            π Exploring Second-Order SQL Injection with Out-of-Band Techniques
NetSPI's Deepak Dhasmana dives into detecting & exploiting second-order SQL injection vulnerabilities. 
π Check out the blog: ow.ly/gukg50UvMvl
#SQLInjection #penetrationtesting #proactivesecurity
               
            
            
                23.12.2024 04:41 β π 1    π 2    π¬ 0    π 0                      
            
         
            
        
            
            
            
            
            
    
    
            
                            
                        
                GitHub - NetSPI/Open-LLM-Security-Benchmark
                Contribute to NetSPI/Open-LLM-Security-Benchmark development by creating an account on GitHub.
            
        
    
    
            What happens when you prioritize security over usability in AI modelsβor vice versa? Our Open LLM Security Benchmark dives deep into the trade-offs and implications, showcasing why this balance is critical for the future of AI. Access the paper here: ow.ly/zT2g50UsaZH
               
            
            
                17.12.2024 14:17 β π 1    π 1    π¬ 0    π 0                      
            
         
            
        
            
            
            
            
            
    
    
            
                            
                        
                Balancing Security and Usability of Large Language Models: An LLM Benchmarking Framework
                Explore the integration of Large Language Models (LLMs) in critical systems and the balance between security and usability with a new LLM benchmarking framework.
            
        
    
    
            Balancing usability and security in deployments introduce new and unfamiliar risks to organizations. NetSPI created an open Large Language Model (LLM) framework to help clarify some ambiguity around LLM security.  
 
Read more about this framework in our most recent article: ow.ly/Nhjs50Usaio
               
            
            
                16.12.2024 20:45 β π 2    π 1    π¬ 0    π 1