Methodology for Assessing Kubernetes Namespace-Based Multi-Tenancy Setups – Insinuator.net
Security Considerations on Istio’s CRDs with Namespace-based Multi-Tenancy – Insinuator.net
Assessing Endpoint Protection: Our Approach to EDR/XDR and Supplements Evaluation – Insinuator.net
Vulnerabilities in Broadcom VMware Aria Operations: Privilege Escalation (CVE-2025-41245 / CVE-2026-22721) – Insinuator.net
Hacking a Bluetooth Printer Server: GATT to UART Adapter? – Insinuator.net
BlackBoxAI: AI Agent can get your computer fully compromised – Insinuator.net
New post: Vulnerability Disclosure: JWT Authentication Bypass in OpenID Connect Authenticator for Tomcat
https://insinuator.net/2026/02/jwt-authentication-bypass-in-openid-connect-authenticator-for-tomcat/Vulnerability Disclosure: JWT Authentication Bypass in OpenID Connect Authenticator for Tomcat – Insinuator.net
One More Thing: Introducing the New macOS 26 Tahoe Hardening Guide – Insinuator.net
Capture Bumble Bluetooth Traffic with Wireshark – Insinuator.net
Incident Response in GCP: Out of Scope – Ouf of Mind – Insinuator.net