Skip to content
  • 0 Votes
    1 Posts
    0 Views
    jerraddahlager@infosec.exchangeJ
    I deployed Microsoft Entra Prompt Shield end-to-end and tested it against real jailbreak payloads across supported AI traffic, including ChatGPT and Gemini in my lab.Prompt Shield inspects AI traffic at the network layer using TLS inspection and conversation schemes, allowing adversarial prompts to be blocked before they reach the model while clean traffic passes through transparently.Instead of building defenses into every application independently, you can apply one policy across multiple AI services. That’s a meaningful step toward giving security teams better visibility into AI usage.I published the full deployment, testing, and results in my blog below:https://nineliveszerotrust.com/blog/prompt-shield-network-ai-gateway/#AISecurity #PromptInjection #ZeroTrust #MicrosoftEntra #CloudSecurity
  • 0 Votes
    1 Posts
    0 Views
    rootshellonline@infosec.exchangeR
    Boost your skills with today’s cybersecurity playlist: exploits, defenses, and real-world lessons. https://www.youtube.com/playlist?list=PLXqx05yil_mfewDtWRQo8UEBmGnkFzbiq#CyberAwareness #NetworkSecurity #ZeroTrust #ThreatIntelligence #Malware
  • 0 Votes
    1 Posts
    0 Views
    thecybermind@infosec.exchangeT
    From an $82k billing leak to AI "Vibeware," the 2026 threat landscape is shifting to automated exploitation. The Cyber Mind Co & AI Cost Ops deconstruct the "AIza" credential failure. Stop the theft with Zero Trust; stop the bill with Hard Caps. #CyberSecurity #ZeroTrust #AI #InfoSechttps://thecybermind.co/2026/03/12/credential-scope-creep/?utm_source=mastodon&utm_medium=jetpack_social
  • 🛠️ Tool

    Uncategorized zerotrust microsoftgraph azuread tenantsecurity
    1
    0 Votes
    1 Posts
    3 Views
    hasamba@infosec.exchangeH
    ----------------️ Tool===================Executive summary:The Zero Trust Assessment is a Microsoft PowerShell module designed to evaluate tenant configuration against Zero Trust principles and produce a local HTML report. The module performs read-only checks via Microsoft Graph and, optionally, Azure sign-in/audit log verification, and requests administrator consent on the initial connection.Technical details:• The module operates by authenticating to Microsoft Graph to enumerate tenant configuration and security-related settings. When available, it also connects to Microsoft Azure to verify export of audit and sign-in logs.• The assessment is explicitly read-only and stores results locally in an output folder that contains an ZeroTrustAssessmentReport.html file and associated artifacts.• Initial authentication requires Global Administrator consent to grant a set of Graph permissions. Subsequent assessments can run under Global Reader where applicable.Permissions observed:AuditLog.Read.AllCrossTenantInformation.ReadBasic.AllDeviceManagementApps.Read.AllDeviceManagementConfiguration.Read.AllDirectory.Read.AllDirectoryRecommendations.Read.AllPolicy.Read.AllPolicy.Read.ConditionalAccessReports.Read.AllRoleManagement.Read.AllUserAuthenticationMethod.Read.AllPrivilegedAccess.Read.AzureADHow it works (conceptual):• The module queries tenant objects, policy configuration, device management settings, role and entitlement data, and authentication methods via Graph endpoints.• If Azure sign-in is provided, additional checks validate whether audit/sign-in logs are being exported and accessible for monitoring and retention checks.Use cases:• Internal security reviews to benchmark tenant configuration against Zero Trust recommendations.• Regular health checks before audits or compliance assessments.• Pre-engagement diagnostic for third‑party security assessments (with caution about sharing results).Limitations and considerations:• The tool requires elevated consent on the first run; organizations must review requested Graph permissions before consenting.• The assessment may skip Azure‑dependent checks when Azure access is not provided, producing partial results.• Large tenants can experience runs exceeding 24 hours; the report and export folder contain sensitive tenant metadata and should be handled securely.References & notes:• The module name and approach indicate an endpoint‑driven audit using Graph APIs with local result storage. Additions such as custom report paths are supported conceptually. tool #ZeroTrust #MicrosoftGraph #AzureAD #tenant_security Source: https://learn.microsoft.com/en-us/security/zero-trust/assessment/get-started
  • 0 Votes
    1 Posts
    0 Views
    rootshellonline@infosec.exchangeR
    Boost your skills with today’s cybersecurity playlist: exploits, defenses, and real-world lessons. https://www.youtube.com/playlist?list=PLXqx05yil_mfoBxJ3ER2KkNgeMh6ivUWe#CyberAwareness #NetworkSecurity #ZeroTrust #ThreatIntelligence #Malware
  • 0 Votes
    1 Posts
    0 Views
    rootshellonline@infosec.exchangeR
    Your daily dose of hacking & defense. Check out today’s curated playlist for pros & learners alike. https://www.youtube.com/playlist?list=PLXqx05yil_meOE0cBEpArl5NG-lpdAW5c#Hacking #CyberDefense #ZeroTrust #CyberAwareness #Malware
  • 0 Votes
    1 Posts
    6 Views
    cirosec@infosec.exchangeC
    Die heutigen, hochdynamischen IT-Landschaften stellen Organisationen vor neue Anforderungen beim Schutz privilegierter Zugriffe. Traditionelle Ansätze stoßen schnell an ihre Grenzen.Die moderne Antwort darauf: Privileged Access Security (PAS)Im Webinar zeigt Ihnen unser Partner Silverfort, wie PAS…• privilegierte Zugriffe in Echtzeit absichert – ohne Agenten und Proxies,• mit adaptiver Authentifizierung und Just-in-Time-Richtlinien die Angriffsfläche drastisch reduziert,• alle privilegierten Konten und Schatten-Admins sichtbar macht,• die Implementierungszeit verkürzt und den Administrationsaufwand minimiert• und durch MFA-Integration und Identity Firewall über klassische PAM-Funktionalitäten hinausgeht.Jetzt anmelden und Platz sichern:https://cirosec.de/news/privilegierter-zugriffe-ohne-agenten-proxys-mit-silverfort/#cybersecurity #privilegedaccess #pas #identitysecurity #zerotrust #mfa
  • 0 Votes
    1 Posts
    0 Views
    anchore@mstdn.businessA
    Why guard the castle gates if the threat is already inside? Stop focusing solely on the perimeter. It's time to secure the workload itself. Anchore's Chadd Owen breaks down how to protect the software layer.https://anchore.com/blog/anchore-enterprise-powers-dow-zero-trust/#ZeroTrust #DoD