https://tailscale.com/blog/how-nat-traversal-works
A delightful and thorough explanation of NAT traversal.
/ht @Cirio
https://tailscale.com/blog/how-nat-traversal-works
A delightful and thorough explanation of NAT traversal.
/ht @Cirio
āThe entire enterprise private network is not considered an implicit trust zone.ā
If your VPN rules include, āfrom trust to trustā, itās not #ZeroTrust.
I had my first #freelance client call yesterday. A solid first performance⦠except for the part where I referred to the NIST Cybersecurity Framework as the NIST Cloud something something. Fortunately, the client wasnāt fussed about it. š
An AI-powered threat modeling tool that leverages OpenAI's GPT models to generate threat models for a given application based on the STRIDE methodology. - mrwadams/stride-gpt
Unfortunately my first reaction was, of course Microsoft is vulnerable to an ATO scheme⦠but in theory any provider that supports device code flow is vulnerable. Itās not an OAuth 2 problem, itās a phishing problem.
This attack method emphasizes the importance of device verification and authorization. An untrusted device shouldnāt be permitted to participate in the device code flow.
#AWS: "whoAMI" attacks give attackers code execution on Amazon EC2 instances:
OAuth2 Proxy: the MVP of zero trust network access.
Cool example of using an LLM for threat modelling that Iām keen to try.
https://xvnpw.github.io/posts/scaling-threat-modeling-with-ai/
h/t @adamshostack