Links
AddI realised that many companies offer no-code platforms to their users for automating workflows. The... Tagged with webdev, programming, javascript, ai.
Long-lost copies of Andy Warhol's Amiga art, produced at a 1985 event, resurfaced in July 2024. They shed light on an earlier discovery.
While preparing for my Black Hat and DEF CON talks in July of this year, I found the most impactful Entra ID vulnerability that I will probably ever find. One that could have allowed me to compromise every Entra ID tenant in the world (except probably those in national cloud deployments). If you are an Entra ID admin reading this, yes that means complete access to your tenant. The vulnerability consisted of two components: undocumented impersonation tokens that Microsoft uses in their backend for service-to-service (S2S) communication, called “Actor tokens”, and a critical vulnerability in the (legacy) Azure AD Graph API that did not properly validate the originating tenant, allowing these tokens to be used for cross-tenant access.
Compatibility:
Source: See Trivy website for details.
Trivy is an all-in-one open source security scanner that can help you identify vulnerabilities and IaC misconfigurations, discover SBOMs, perform cloud scanni…
What is EKS-D Amazon EKS Distro (EKS-D) is a Kubernetes distribution based on and used by Amazon Elastic Kubernetes Service (Amazon EKS). It provides latest upstream updates as well as extended security patching support…
Curated collection of DIY-friendly hardware synthesizers and related musical equipment you can build on your own. All open source.
Dmitry.GR: Slowly booting full Linux on the intel 4004 for fun, art, and absolutely no profit
Free domain research tool to discover hosts related to a domain. Find visible hosts from the attackers perspective for Red and Blue Teams.
Customize and extend Claude Code's behavior by registering shell commands
An extremely fast Python linter and code formatter, written in Rust.
A guide to using uv to run Python scripts, including support for inline dependency metadata, reproducible scripts, and more.
Introduction
Follow these best practices for using AWS Identity and Access Management (IAM) to help secure your AWS account and resources.
Use roles to grant an IAM user access through identity federation (authorization by an external service).
Define permissions on a resource in order to grant IAM users access to resources in other AWS accounts.