shakedown.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
A community for live music fans with roots in the jam scene. Shakedown Social is run by a team of volunteers (led by @clifff and @sethadam1) and funded by donations.

Administered by:

Server stats:

290
active users

#azure

2 posts2 participants0 posts today
Phil Gastwirth :imagination:<p>Just spent like 3 days trying to figure out another Azure Tenants Intune rbac roles not applying... it was caused by the intune license group being nested under another group. Nested groups are a wonderful concept but the amount of times they have been the root of random issues is very high. <a href="https://worldkey.io/tags/azure" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>azure</span></a> <a href="https://worldkey.io/tags/intune" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>intune</span></a> <a href="https://worldkey.io/tags/entraID" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>entraID</span></a></p>
Christoffer S.<p>(sophos.com) Evilginx: How Attackers Bypass MFA Through Adversary-in-the-Middle Attacks <a href="https://news.sophos.com/en-us/2025/03/28/stealing-user-credentials-with-evilginx/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">news.sophos.com/en-us/2025/03/</span><span class="invisible">28/stealing-user-credentials-with-evilginx/</span></a></p><p>A short descriptive article about Evilginx and how stealing credentials work, a few suggested ways of detecting etc.</p><p>Summary:<br>This article examines Evilginx, a tool that leverages the legitimate nginx web server to conduct Adversary-in-the-Middle (AitM) attacks that can bypass multifactor authentication (MFA). The tool works by proxying web traffic through malicious sites that mimic legitimate services like Microsoft 365, capturing not only usernames and passwords but also session tokens. The article demonstrates how Evilginx operates, showing how attackers can gain full access to a user's account even when protected by MFA. It provides detection methods through Azure/Microsoft 365 logs and suggests both preemptive and reactive mitigations, emphasizing the need to move toward phishing-resistant FIDO2-based authentication methods.</p><p><a href="https://swecyb.com/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cybersecurity</span></a> <a href="https://swecyb.com/tags/ThreatIntel" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ThreatIntel</span></a> <a href="https://swecyb.com/tags/Evilginx" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Evilginx</span></a> <a href="https://swecyb.com/tags/Phishing" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Phishing</span></a> <a href="https://swecyb.com/tags/Credentials" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Credentials</span></a> <a href="https://swecyb.com/tags/MFA" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>MFA</span></a> <a href="https://swecyb.com/tags/Azure" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Azure</span></a> <a href="https://swecyb.com/tags/Sophos" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Sophos</span></a></p>
IT News<p>Europe is looking for alternatives to US cloud providers - The global backlash against the second Donald Trump administration keeps o... - <a href="https://arstechnica.com/information-technology/2025/03/europe-is-looking-for-alternatives-to-us-cloud-providers/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">arstechnica.com/information-te</span><span class="invisible">chnology/2025/03/europe-is-looking-for-alternatives-to-us-cloud-providers/</span></a> <a href="https://schleuss.online/tags/syndication" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>syndication</span></a> <a href="https://schleuss.online/tags/biz" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>biz</span></a>⁢ <a href="https://schleuss.online/tags/policy" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>policy</span></a> <a href="https://schleuss.online/tags/europe" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>europe</span></a> <a href="https://schleuss.online/tags/azure" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>azure</span></a> <a href="https://schleuss.online/tags/cloud" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cloud</span></a> <a href="https://schleuss.online/tags/trump" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>trump</span></a> <a href="https://schleuss.online/tags/aws" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>aws</span></a> <a href="https://schleuss.online/tags/eu" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>eu</span></a></p>
G :donor: :Tick:<p>This is kinda cool - my <a href="https://infosec.exchange/tags/Azure" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Azure</span></a> <a href="https://infosec.exchange/tags/VaultRecon" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>VaultRecon</span></a> vulnerability (that <a href="https://infosec.exchange/tags/Microsoft" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Microsoft</span></a> say is by design and is not a vulnerability) is now listed in the <a href="https://infosec.exchange/tags/CloudVulnDB" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CloudVulnDB</span></a> 🤩 <a href="https://infosec.exchange/tags/SecurityResearch" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SecurityResearch</span></a> —<a href="https://infosec.exchange/tags/CloudSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CloudSecurity</span></a> <a href="https://infosec.exchange/tags/KeyVault" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>KeyVault</span></a> <a href="https://infosec.exchange/tags/Enumeration" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Enumeration</span></a> <a href="https://infosec.exchange/tags/SharingIsSecuring" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SharingIsSecuring</span></a> <a href="https://infosec.exchange/tags/WeAllWinTogether" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>WeAllWinTogether</span></a> 🤘🏻💪🏻</p><p><a href="https://www.cloudvulndb.org/azure-vault-recon-keyvault-secret-metadata-control-plane-exfiltration" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">cloudvulndb.org/azure-vault-re</span><span class="invisible">con-keyvault-secret-metadata-control-plane-exfiltration</span></a></p>
Ian Brown 👨🏻‍💻<p>“While the price may be eye-popping, <a href="https://eupolicy.social/tags/Alphabet" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Alphabet</span></a> chief executive Sundar Pichai is betting that the <a href="https://eupolicy.social/tags/Wiz" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Wiz</span></a> acquisition will drive growth at its cloud business, which competes with Amazon’s <a href="https://eupolicy.social/tags/AWS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AWS</span></a>, Microsoft’s <a href="https://eupolicy.social/tags/Azure" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Azure</span></a> and <a href="https://eupolicy.social/tags/Oracle" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Oracle</span></a>.”<br><a href="https://on.ft.com/4bEukK3" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">on.ft.com/4bEukK3</span><span class="invisible"></span></a></p>
Jan Bartosik<p>Středeční <a href="https://witter.cz/tags/hiring" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hiring</span></a> update:</p><p>Do interního <a href="https://witter.cz/tags/DevOps" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DevOps</span></a> týmu hledám borce na pozici, které říkáme <br>INFRASTRUCTURE AND DEVOPS SPECIALIST</p><p>HPP, nebo IČO, jak chceš.<br>Hybridní forma práce, kancl <a href="https://witter.cz/tags/Praha" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Praha</span></a> Nusle.<br>Nezávazná pokec s DevOps Leadem není problém, online/onsite.<br>Nespěcháme, hledáme oboustranný "match."</p><p><a href="https://witter.cz/tags/infra" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infra</span></a> <a href="https://witter.cz/tags/devsecops" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>devsecops</span></a> <a href="https://witter.cz/tags/iac" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>iac</span></a> <a href="https://witter.cz/tags/cloud" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cloud</span></a> <a href="https://witter.cz/tags/aws" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>aws</span></a> <a href="https://witter.cz/tags/azure" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>azure</span></a> <a href="https://witter.cz/tags/gcp" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>gcp</span></a> <a href="https://witter.cz/tags/cicd" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cicd</span></a> <a href="https://witter.cz/tags/k8s" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>k8s</span></a></p>
Daily Azure Shit<p>Day 418. The issue with the shit from day 417 is, when having multiple <a href="https://mastodon.social/tags/Terraform" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Terraform</span></a> resources that represent the same underlying <a href="https://mastodon.social/tags/Azure" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Azure</span></a> resource, they run into race conditions. When deleting all security contacts for the same subscription at the same time, the deletion of all but one 'azurerm_security_center_contact' resources would fail.</p>
Vengeur Masqué<p>Do you know the difference between <a href="https://mastodon.hofud.com/tags/Microsoft" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Microsoft</span></a> <a href="https://mastodon.hofud.com/tags/Azure" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Azure</span></a> <a href="https://mastodon.hofud.com/tags/API" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>API</span></a> <a href="https://mastodon.hofud.com/tags/documentation" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>documentation</span></a> and the <a href="https://mastodon.hofud.com/tags/Necronomicon" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Necronomicon</span></a>?</p><p>None. Nobody could read them and keep their sanity.</p>
Kevin Karhan :verified:<p><span class="h-card" translate="no"><a href="https://labyrinth.zone/users/Velveteen" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>Velveteen</span></a></span> Also don't forget the <a href="https://infosec.space/tags/cringe" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cringe</span></a> <a href="https://infosec.space/tags/song" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>song</span></a> that makes every <a href="https://infosec.space/tags/Windows" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Windows</span></a> &amp; <a href="https://infosec.space/tags/Azure" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Azure</span></a> <a href="https://infosec.space/tags/developer" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>developer</span></a> vomit!</p><p><a href="https://www.youtube.com/watch?v=Zww2ivWdLas&amp;t=43s" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">youtube.com/watch?v=Zww2ivWdLa</span><span class="invisible">s&amp;t=43s</span></a></p>
Den Delimarsky<p>I improved my earlier prototype on MCP server auth with Entra ID - it now can use "session tokens" instead of pretending to be a public client 😀</p><p>All open-source, on GitHub, and written with TypeScript.</p><p><a href="https://den.dev/blog/mcp-server-auth-entra-id-session/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">den.dev/blog/mcp-server-auth-e</span><span class="invisible">ntra-id-session/</span></a></p><p><a href="https://mastodon.social/tags/mcp" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>mcp</span></a> <a href="https://mastodon.social/tags/modelcontextprotocol" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>modelcontextprotocol</span></a> <a href="https://mastodon.social/tags/ai" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ai</span></a> <a href="https://mastodon.social/tags/auth" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>auth</span></a> <a href="https://mastodon.social/tags/security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>security</span></a> <a href="https://mastodon.social/tags/webdev" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>webdev</span></a> <a href="https://mastodon.social/tags/azure" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>azure</span></a></p>
Cassander<p>Is today <a href="https://infosec.exchange/tags/FediHire" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>FediHire</span></a> Friday? Sure looks like it!</p><p>What I'm looking for: A senior level, individual contributor role supporting Windows, Active Directory, Certificates, PKI, Azure, and information security in a large environment. Interested in relocating outside of the US. I like to solve weird problems and make computers run smoothly. I want to help others use technology effectively.</p><p>My main focus the last few years has been rebuilding and modernizing a struggling certificate management team. That includes growing the team to meet our company needs, migrating our AD-integrated private PKI stack, getting a handle on our web PKI consumption, and making massive improvements to our certificate lifecycle management platform. I supported and advised our CyberSec and Desktop teams as we rolled out multi-factor authentication to 50,000 employees and contractors across the US. My background in understanding deep computer fundamentals, talent for quickly grasping nuances of larger systems, and calmness in a crisis have contributed to quickly resolving major technology outages regardless of root cause.</p><p>This role hasn't been exclusively technical. A big part of my current job is building relationships with our developers to help them understand how certificates work, the responsible ways to use them, and what our relevant internal policies are. I've been training and teaching junior and mid-level engineers both practical PKI concepts and our specific enterprise requirements. I've gotten to spend some time with upper management to both explain the immediate challenges we've had and the plans we can implement improve our infrastructure, reducing costs and outages.</p><p>While this position has been focused on certs and how to use them, I'm very comfortable considering a technical leadership role for Windows (server and desktop) administration and Active Directory. I also have some good experience with Azure and virtualization platforms, but they haven't been my daily focus for several years.</p><p>My current employer is direct retail for general public consumers. I've also worked in banking/finance, manufacturing, and architecture firms. The common thread is I love to help people leverage technology for their goals, to help them be more effective. </p><p>In my personnel/volunteer time I've done very similar: working backstage with lights/sounds/projections so live performers can do their best. </p><p>Right now I'm in Syracuse, New York (about five hours from NYC), but I'm open to relocation/migration anywhere in the world. </p><p>PMs open if you want to talk details. Boosts/reshares appreciated.</p><p><a href="https://infosec.exchange/tags/Job" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Job</span></a> <a href="https://infosec.exchange/tags/GetFediHired" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>GetFediHired</span></a> <a href="https://infosec.exchange/tags/ITJobs" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ITJobs</span></a> <a href="https://infosec.exchange/tags/Windows" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Windows</span></a> <a href="https://infosec.exchange/tags/ActiveDirectory" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ActiveDirectory</span></a> <a href="https://infosec.exchange/tags/Certificate" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Certificate</span></a> <a href="https://infosec.exchange/tags/PKI" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>PKI</span></a> <a href="https://infosec.exchange/tags/Azure" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Azure</span></a> <a href="https://infosec.exchange/tags/Migration" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Migration</span></a> <a href="https://infosec.exchange/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSecurity</span></a> <a href="https://infosec.exchange/tags/InfoSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>InfoSecurity</span></a></p>
Kevin Karhan :verified:<p><span class="h-card" translate="no"><a href="https://sharkey.stellar.gay/@terra" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>terra</span></a></span> lets just say I'd rather want to see that for classical hosters, not just <a href="https://infosec.space/tags/aws" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>aws</span></a>, <a href="https://infosec.space/tags/Azure" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Azure</span></a> &amp; <a href="https://infosec.space/tags/GCP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>GCP</span></a>.</p><ul><li>That being said using <a href="https://www.speedtest.net/apps/cli" rel="nofollow noopener noreferrer" target="_blank"><code>speedtest-cli</code></a>, <a href="https://github.com/librespeed/speedtest-cli" rel="nofollow noopener noreferrer" target="_blank"><code>librespeed-cli</code></a>, <a href="https://iperf.fr/iperf-download.php" rel="nofollow noopener noreferrer" target="_blank"><code>iperf3</code></a> should <a href="https://manpages.org/iperf3" rel="nofollow noopener noreferrer" target="_blank">work</a> on all of them just fine...</li></ul>
Daily Azure Shit<p>Day 413. <a href="https://mastodon.social/tags/Azure" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Azure</span></a> PIM has always been annoyingly slow, but in our recent testing it took up to 35 seconds for PIM to "validate your request" (whatever that means) before you can actually elevate to your privileged roles.</p>
Shawn Wildermuth (🇺🇦++)<p>ICYMI - Coding Short from the Vault:<br> <br> Coding Shorts #105: Centralize Your <a href="https://fosstodon.org/tags/azure" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>azure</span></a> App's Configuration<br> <br> youtube.com/watch?v=TisCR7AJCpE</p>
Daily Azure Shit<p>Day 412. We already know that authenticating <a href="https://mastodon.social/tags/Azure" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Azure</span></a> SDKs or <a href="https://mastodon.social/tags/Terraform" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Terraform</span></a> by using the identity of your Azure CLI is pretty unreliable. But being able to fetch the user ID but not a token for it - we haven't seen that one before.</p>
wobl 🛋️ ☕️<p>Es wird Zeit dass u.a. <a href="https://chaos.social/tags/Windows" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Windows</span></a>, <a href="https://chaos.social/tags/Office" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Office</span></a> und diverse Clouds wie <a href="https://chaos.social/tags/Azure" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Azure</span></a>, <a href="https://chaos.social/tags/Google" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Google</span></a> und <a href="https://chaos.social/tags/AWS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AWS</span></a> konsequent boykottiert werden. Vor allem von staatlichen Stellen. Was hat <a href="https://chaos.social/tags/Trump" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Trump</span></a> hier für ein großes Druckmittel in der Hand - von Spionage mal abgesehen. Völlig irre und verantwortungslos hier den <a href="https://chaos.social/tags/USA" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>USA</span></a> noch irgendwie zu vertrauen.</p>
Kevin Karhan :verified:<p><span class="h-card" translate="no"><a href="https://cyberplace.social/@GossiTheDog" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>GossiTheDog</span></a></span> the sheer fact that <a href="https://infosec.space/tags/MSPs" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>MSPs</span></a> &amp; <a href="https://infosec.space/tags/CSPs" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CSPs</span></a> can access clients' setups without proper <a href="https://infosec.space/tags/authorization" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>authorization</span></a> [including <a href="https://infosec.space/tags/KYC" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>KYC</span></a> / <a href="https://infosec.space/tags/KYB" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>KYB</span></a>, <a href="https://infosec.space/tags/AuthCode" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AuthCode</span></a>|s and proper authorization via contract] is already sickening.</p><ul><li><a href="https://cyberplace.social/@GossiTheDog/114104955818018205" rel="nofollow noopener noreferrer" target="_blank">This</a> literally <em>begs to be abused</em> via <a href="https://infosec.space/tags/SocialEngineering" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SocialEngineering</span></a> / <a href="https://infosec.space/tags/SocialHacking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SocialHacking</span></a> of <a href="https://infosec.space/tags/Microsoft" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Microsoft</span></a> personnel or just blatant <em>"<a href="https://infosec.space/tags/PrivilegueEscalation" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>PrivilegueEscalation</span></a>"</em> through falsefully claiming to be a <a href="https://infosec.space/tags/MSP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>MSP</span></a> / <a href="https://infosec.space/tags/CSP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CSP</span></a> contracted by the targeted company.</li></ul><p>Such fundamental <a href="https://infosec.space/tags/ITsec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ITsec</span></a> fuckups are reasons alone not to use <a href="https://infosec.space/tags/Azure" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Azure</span></a> or any <a href="https://infosec.space/tags/Microsoft" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Microsoft</span></a> products &amp; services <em>at all</em>...</p><ul><li>I mean, it doesn't require <a href="https://infosec.space/tags/Mitnick" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Mitnick</span></a>-level skills to pull this off, since it doesn't necessitate <a href="https://infosec.space/tags/Lapsus" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Lapsus</span></a>-Style <a href="https://infosec.space/tags/SIMswap" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SIMswap</span></a> or other means to gain access...</li></ul>
Felix Eckhardt<p>The US are no reliable partner anymore.</p><p><a href="https://noyb.eu/en/us-cloud-soon-illegal-trump-punches-first-hole-eu-us-data-deal" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">noyb.eu/en/us-cloud-soon-illeg</span><span class="invisible">al-trump-punches-first-hole-eu-us-data-deal</span></a></p><p><a href="https://det.social/tags/cloud" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cloud</span></a> <a href="https://det.social/tags/aws" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>aws</span></a> <a href="https://det.social/tags/gcp" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>gcp</span></a> <a href="https://det.social/tags/azure" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>azure</span></a> <a href="https://det.social/tags/uspol" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>uspol</span></a> <a href="https://det.social/tags/privacy" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>privacy</span></a> <a href="https://det.social/tags/eupol" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>eupol</span></a></p>
Jesse Skinner<p>Looking for a Canadian (or, at the very least, non-US with a Canadian presence) cloud hosting company that has services similar to AWS, Azure, Google Cloud etc. Particularly per-minute pricing on instances, autoscaling and load balancing, object storage, API-driven deployment, etc.</p><p>Any suggestions or experience with this? cacloud.com is the only one I could find, any experience with them?</p><p><a href="https://toot.cafe/tags/hosting" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hosting</span></a> <a href="https://toot.cafe/tags/webdev" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>webdev</span></a> <a href="https://toot.cafe/tags/aws" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>aws</span></a> <a href="https://toot.cafe/tags/canada" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>canada</span></a> <a href="https://toot.cafe/tags/azure" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>azure</span></a> <a href="https://toot.cafe/tags/googlecloud" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>googlecloud</span></a></p>
video games skies and skylinesSonic the hedgehog (Master System) (1991)<br> .<br> .<br> <a href="https://pixelfed.social/discover/tags/sonic?src=hash" class="u-url hashtag" rel="nofollow noopener noreferrer" target="_blank">#sonic</a> <a href="https://pixelfed.social/discover/tags/sonicthehedgehog?src=hash" class="u-url hashtag" rel="nofollow noopener noreferrer" target="_blank">#sonicthehedgehog</a> <a href="https://pixelfed.social/discover/tags/mastersystem?src=hash" class="u-url hashtag" rel="nofollow noopener noreferrer" target="_blank">#mastersystem</a> <a href="https://pixelfed.social/discover/tags/sega?src=hash" class="u-url hashtag" rel="nofollow noopener noreferrer" target="_blank">#sega</a> <a href="https://pixelfed.social/discover/tags/segamastersystem?src=hash" class="u-url hashtag" rel="nofollow noopener noreferrer" target="_blank">#segamastersystem</a> <a href="https://pixelfed.social/discover/tags/videogames?src=hash" class="u-url hashtag" rel="nofollow noopener noreferrer" target="_blank">#videogames</a> <a href="https://pixelfed.social/discover/tags/gaming?src=hash" class="u-url hashtag" rel="nofollow noopener noreferrer" target="_blank">#gaming</a> <a href="https://pixelfed.social/discover/tags/games?src=hash" class="u-url hashtag" rel="nofollow noopener noreferrer" target="_blank">#games</a> <a href="https://pixelfed.social/discover/tags/retrogaming?src=hash" class="u-url hashtag" rel="nofollow noopener noreferrer" target="_blank">#retrogaming</a> <a href="https://pixelfed.social/discover/tags/retrogames?src=hash" class="u-url hashtag" rel="nofollow noopener noreferrer" target="_blank">#retrogames</a> <a href="https://pixelfed.social/discover/tags/arcade?src=hash" class="u-url hashtag" rel="nofollow noopener noreferrer" target="_blank">#arcade</a> <a href="https://pixelfed.social/discover/tags/aesthetic?src=hash" class="u-url hashtag" rel="nofollow noopener noreferrer" target="_blank">#aesthetic</a> <a href="https://pixelfed.social/discover/tags/backgrounds?src=hash" class="u-url hashtag" rel="nofollow noopener noreferrer" target="_blank">#backgrounds</a> <a href="https://pixelfed.social/discover/tags/gamebackgrounds?src=hash" class="u-url hashtag" rel="nofollow noopener noreferrer" target="_blank">#gamebackgrounds</a> <a href="https://pixelfed.social/discover/tags/clouds?src=hash" class="u-url hashtag" rel="nofollow noopener noreferrer" target="_blank">#clouds</a> <a href="https://pixelfed.social/discover/tags/sky?src=hash" class="u-url hashtag" rel="nofollow noopener noreferrer" target="_blank">#sky</a> <a href="https://pixelfed.social/discover/tags/azure?src=hash" class="u-url hashtag" rel="nofollow noopener noreferrer" target="_blank">#azure</a>