Blog
Cloud security lessons, Zero Trust insights, and the occasional cat joke.
Scan Every Blob, Trace Every Read: Defender for Storage + Sentinel

Storage is where malware waits. A blob uploaded to ingest/ by a pipeline step, a partnerβs SFTP connector, or a misconfigured Logic App sits quietly until something downstream opens it β a Data Factory copy, a Function app, a Synapse notebook, a β¦
Detecting Infostealer Session Hijacking with Microsoft Sentinel

Nearly 70% of incidents in the Americas now begin with stolen or misused accounts. Infostealers are the engine behind that number β families like Lumma, RedLine, and Vidar export browser cookies and session tokens directly from the victimβs machine, β¦
Investigate Hidden Privilege Paths with Microsoft Sentinel Data Federation and Custom Graphs

After a compromised service principal incident, the first triage question is always the same: βWhat else can this identity reach?β The answer usually lives outside Sentinel, buried in entitlement exports, RBAC snapshots, or asset inventories that β¦
Block Prompt Injection at the Network Layer with Entra Prompt Shield

A while back I built an LLM Firewall with AWS Lambda, a proxy that sits between users and the model to catch prompt injection. It worked, but it meant writing custom code for every app and having zero visibility into AI services I didnβt own. Thatβs β¦
Building Custom Sentinel Connectors in One Click with CCF Push

Getting custom data into Microsoft Sentinel has traditionally required a lot of moving parts. You need a Data Collection Endpoint, a Data Collection Rule, an Entra app registration with a client secret, RBAC role assignments, a custom table β¦
AKS Runtime Security: Binary Drift, Anti-Malware & Gated Deployment with Defender for Cloud

In December, I published a post on securing the container supply chain β SBOM generation, image signing, and build provenance with GitHub Actions. That covered build-time security: making sure the image you ship is the image you built. But what β¦
Detecting OAuth Redirect Abuse with Microsoft Sentinel and Entra ID

On March 2, 2026, Microsoft published an advisory on OAuth redirection abuse enabling phishing and malware delivery. Microsoft described phishing-led campaigns where attackers register OAuth apps with attacker-controlled redirect URIs, then send β¦
The February 2026 Microsoft Sentinel Drop: UEBA Essentials, Copilot Connector, and 9 New GA Connectors

February 2026 brought one of the more substantial Sentinel drops in recent memory. UEBA Essentials hit v3.0.6 with a refined workbook and more than 30 hunting queries (including multi-cloud detections shipped in earlier releases), the M365 Copilot β¦
March 2026 Entra ID Changes: Passkey Auto-Enablement and Conditional Access Enforcement

Microsoft is shipping two Entra ID changes in March 2026 that will change how your users authenticate. Neither change requires administrator action to take effect, and that is precisely the risk. If you do not act before the deadlines, Microsoft β¦
Just-In-Time Access for AI Agents: Building a ZSP Gateway in Azure

AI coding assistants need Contributor access to deploy infrastructure. Backup automation needs Key Vault secrets at 2 AM. Security scanners need Reader access on a schedule. The easy answer is standing permissions-give each service principal what it β¦

