ConsentFix: Abusing Azure OAuth Consent to Take Over Microsoft Accounts
Forgotten Keys, Open Clouds: The Danger of Credentials Lost in SaaS
The Ghost Session Problem: The Real Persistence Threat in Azure AD
Exploiting Identity in Azure: The Real Impact of Pass-the-Token Attacks
From Denials to Breach: Detecting MFA Exploitation
From Shell to Cloudshell: The Escalation Path Attackers Use After VM Breach
When ‘Contributor’ Means Control: The Hidden Risk in Azure RBAC
Databricks Webhooks: A Silent Backdoor for Malicious Execution
Azure Function Apps: The Hidden Dangers of Overexposed HTTP Triggers