38 Followers
0 Following
34 Posts
Bold Statements.
IT-Security Blog feed run by @ERNW.
Bloghttps://insinuator.net
Imprinthttps://insinuator.net/about
Run byhttps://ernw.de
Conferencehttps://troopers.de
Twitter@Insinuator
New post: Methodology for Assessing Namespace-Based Multi-Tenancy Setups https://insinuator.net/2026/03/methodology-for-assessing-namespace-based-multi-tenancy-setups/
Methodology for Assessing Kubernetes Namespace-Based Multi-Tenancy Setups – Insinuator.net

New post: Security Considerations on Istio’s CRDs with Namespace-based Multi-Tenancy https://insinuator.net/2026/03/security-considerations-on-istios-crds-with-namespace-based-multi-tenancy/
Security Considerations on Istio’s CRDs with Namespace-based Multi-Tenancy – Insinuator.net

New post: Assessing Endpoint Protection: Our Approach to EDR/XDR and Supplements Evaluation https://insinuator.net/2026/03/assessing-endpoint-protection-our-approach-to-edr-xdr-and-supplements-evaluation/
Assessing Endpoint Protection: Our Approach to EDR/XDR and Supplements Evaluation – Insinuator.net

New post: Vulnerabilities in Broadcom VMware Aria Operations: Privilege Escalation (CVE-2025-41245 / CVE-2026-22721) https://insinuator.net/2026/03/vulnerabilities-in-broadcom-vmware-aria-operations-privilege-escalation-cve-2025-41245-cve-2026-22721/
Vulnerabilities in Broadcom VMware Aria Operations: Privilege Escalation (CVE-2025-41245 / CVE-2026-22721) – Insinuator.net

New post: Hacking a Bluetooth Printer Server: GATT to UART Adapter? https://insinuator.net/2026/03/hacking-a-bluetooth-printer-server-gatt-to-uart-adapter/
Hacking a Bluetooth Printer Server: GATT to UART Adapter? – Insinuator.net

New post: BlackBoxAI: AI Agent can get your computer fully compromised https://insinuator.net/2026/03/blackboxai-ai-agent-can-get-your-computer-fully-compromised/
BlackBoxAI: AI Agent can get your computer fully compromised – Insinuator.net

New post: Vulnerability Disclosure: JWT Authentication Bypass in OpenID Connect Authenticator for Tomcat https://insinuator.net/2026/02/jwt-authentication-bypass-in-openid-connect-authenticator-for-tomcat/
Vulnerability Disclosure: JWT Authentication Bypass in OpenID Connect Authenticator for Tomcat – Insinuator.net

New post: One More Thing: Introducing the New macOS 26 Tahoe Hardening Guide https://insinuator.net/2026/02/one-more-thing-introducing-the-new-macos-26-tahoe-hardening-guide/
One More Thing: Introducing the New macOS 26 Tahoe Hardening Guide – Insinuator.net

New post: Capture Bumble Bluetooth Traffic with Wireshark https://insinuator.net/2026/02/capture-bumble-bluetooth-traffic-with-wireshark/
Capture Bumble Bluetooth Traffic with Wireshark – Insinuator.net

New post: Incident Response in GCP: Out of Scope – Ouf of Mind https://insinuator.net/2026/01/incident-response-in-gcp-out-of-scope-ouf-of-mind/
Incident Response in GCP: Out of Scope – Ouf of Mind – Insinuator.net