Azure cloud security tutorial series – Chapter 4 [Establish VNet Peering]
Objective In the last chapter we saw on how to add resource to a VNet now in this chapter we will see how we will enable connectivity between two virtualRead More →
Objective In the last chapter we saw on how to add resource to a VNet now in this chapter we will see how we will enable connectivity between two virtualRead More →
Following the disclosure of a serious flaw in the Microsoft Power Platform, researchers in the field of information security are advising users of Azure Active Directory (AD) to keep anRead More →
Accounts may be hijacked and data can be uploaded without authentication if a certain version of Jupiter X Core, a premium plugin for setting up WordPress and WooCommerce websites, isRead More →
CVE-2023-36874 is not just any vulnerability; rather, it is a zero-day that is being actively exploited. This indicates that the vulnerability was being exploited in the wild even before anyRead More →
The Internet of Things (IoT) is now experiencing its zenith and is quickly growing its capabilities. This is being accomplished through the transformation of commonplace goods, such as light bulbsRead More →
Overview In the last chapter (Azure cloud security tutorial series – Chapter 2 [Virtual Network]) we saw on how to create VNet in Azure. Once you have VNet created itsRead More →
Basic Overview Network is combination of many different systems connected together. In the Azure cloud security tutorial series – Chapter 1 [Azure Account] we talked about virtual network is aRead More →
Basic Overview Azure is the mostly used cloud in IT organizations. Before cloud came into existence many companies or organizations were using Microsoft products in their organization like Windows OS,Read More →
This summer, hundreds of thousands of people will be preparing to take off while sitting back, relaxing, and using the airplane mode setting on their iPhones. When this setting isRead More →
In the past, Citrix was found to have a Zero-Day vulnerability in its Citrix NetScaler Application Delivery Controller (ADC), which made it possible for malicious actors to carry out remoteRead More →