Conditional-Access

Beyond the Door: Why …

This is a personal blog and all content herein is my personal opinion and not that of my employer.

Introduction

Modern enterprise security is built on a simple idea: keep the bad guys out. But what happens when the “bad guy” is already inside–riding a legitimate session, holding a …

Announcing ISDF – Intune Stateful Device Fingerprinting
Announcing ISDF – Intune …

Hero image generated by ChatGPT

This is a personal blog. All opinions are my own - not my employer’s.


Enjoying the content? If you value the time, effort, and resources invested in creating it, please consider supporting me on Ko-fi.

Support me on Ko-fi

Earlier this year, I published OuttaTune …

Turn On, Tune In, Cop Out: The sorta, not-really, fix for OuttaTune from Microsoft
Turn On, Tune In, Cop …

Hero image generated by ChatGPT

This is a personal blog. All opinions are my own - not my employer’s.


Enjoying the content? If you value the time, effort, and resources invested in creating it, please consider supporting me on Ko-fi.

Support me on Ko-fi

Introduction

This is a follow-up to my …

OuttaTune: Bypassing Conditional Access in Microsoft Intune
OuttaTune: Bypassing …

Hero Image generated by ChatGPT

This is a personal blog and all content therein is my personal opinion and not that of my employer.


Enjoying the content? If you value the time, effort, and resources invested in creating it, please consider supporting me on Ko-fi. …

InsomniHack & Entra Hybrid - Attack & Defence Mind Map : It's easier to attack than you think
InsomniHack & Entra …

This is a personal blog and all content herein is my personal opinion and not that of my employer.


Enjoying the content? If you value the time, effort, and resources invested in creating it, please consider supporting me on Ko-fi.

Support me on Ko-fi

Introduction

I recently had the privilege …