I wish Okta would let you upload a CSV file and use it to create many groups. Until such a feature is available, here is a short post explaining how to automate the process of creating dozens of Okta groups using Python.
If you are a security person who works with Google Workspace, this tool is indispensable. It allows you to review logs for many of the Google services and to remedy security or privacy concerns.
I use my mobile phone quite a lot, in fact, my usage borders on the unhealthy type of attachment to such devices. In my defence, a lot of my life is made much easier through the use of applications I have on my iPhone. In this post, I list a couple of those that are among my favourite ones.
Microsoft's Attack Surface Analyzer runs pretty smoothly and is super easy to use. It can be a true asset for people trying to understand the inner workings of applications or tools before introducing them into production environments. Definitely worth a try.
I came upon Semgrep while doing a code review and was seriously impressed by the ease of use, language support, and community rule sets. If you are looking for a decent open source SAST tool to aid your code reviews, look no further.
Both Cortex and IntelOwl are awesome tools for observable analysis, I wanted to learn a bit about both of them and what better way to do that than trying both tools and writing a comparison of them?
MISP is a great platform for intelligence sharing and collaboration. I have had it on my mind for a while now but only today did I get the chance to learn more about it. This post is the first in many to come about MISP and use cases I will be building around it.
We all need a way to send our friends the latest memes but that doesn't mean we should sacrifice our privacy and data control while doing so. In this post, I share some of the services I use to protect my privacy and remain productive.
One question in CyberDefender's most recent challenge taught me something new. The question asked you to listen to the audio stream that can be found in the PCAP file to find the flag and claim the points. I never knew Wireshark supports doing this hence this TIL.
The way pinned messages work in Slack is one of the things I find frustrating about the platform. If I pin a message, I expect it to remain visible in the channel not tucked into a side tab. This post outlines a rough PoC for a Slack application that can help you "truly" pin your messages.