Listen

Description

Credential Guard and Kerberos delegation

https://isc.sans.edu/diary/Credential%20Guard%20and%20Kerberos%20delegation/31488

The Day We Unveiled the Secret Rotation Illusion

https://www.clutch.security/blog/the-day-we-unveiled-the-secret-rotation-illusion

Corrupt Word Documents used in Phshing

https://x.com/anyrun_app/status/1861024182210900357

IBM Security Verify Access Appliance Vulnerabilities

https://www.ibm.com/support/pages/security-bulletin-multiple-security-vulnerabilities-were-found-ibm-security-verify-access-appliance-cve-2024-49803-cve-2024-49804-cve-2024-49805-cve-2024-49806