all InfoSec news
All You Need is Guest
Jan. 31, 2024, 5:33 p.m. | Black Hat
Black Hat www.youtube.com
In this talk, we will show how guests can leverage undocumented APIs to bypass limitations and gain unauthorized access to sensitive business data and capabilities including corporate SQL servers, SharePoint sites, and KeyVault secrets....
By: Michael Bargury
Full Abstract and Presentation Materials:
https://www.blackhat.com/us-23/briefings/schedule/#all-you-need-is-guest-32647
access accounts apis azure azure ad bypass can enterprise external grant limitations resources risk security security risk unauthorized unauthorized access undocumented wrong
More from www.youtube.com / Black Hat
Locknote: Conclusions and Key Takeaways from Day 2
2 weeks, 2 days ago |
www.youtube.com
Locknote: Conclusions and Key Takeaways from Day 1
2 weeks, 2 days ago |
www.youtube.com
Keynote: My Lessons from the Uber Case
2 weeks, 2 days ago |
www.youtube.com
The Black Hat Europe Network Operations Center (NOC) Report
2 weeks, 3 days ago |
www.youtube.com
Jobs in InfoSec / Cybersecurity
SOC 2 Manager, Audit and Certification
@ Deloitte | US and CA Multiple Locations
Principal Security Analyst - Threat Labs (Position located in India) (Remote)
@ KnowBe4, Inc. | Kochi, India
Cyber Security - Cloud Security and Security Architecture - Manager - Multiple Positions - 1500860
@ EY | Dallas, TX, US, 75219
Enterprise Security Architect (Intermediate)
@ Federal Reserve System | Remote - Virginia
Engineering -- Tech Risk -- Global Cyber Defense & Intelligence -- Associate -- Dallas
@ Goldman Sachs | Dallas, Texas, United States
Vulnerability Management Team Lead - North Central region (Remote)
@ GuidePoint Security LLC | Remote in the United States