helvede.net is one of the many independent Mastodon servers you can use to participate in the fediverse.
Velkommen til Helvede, fediversets hotteste instance! Vi er en queerfeministisk server, der shitposter i den 9. cirkel. Welcome to Hell, We’re a DK-based queerfeminist server. Read our server rules!

Server stats:

172
active users

#azure

15 posts11 participants0 posts today

#KRITIS Sektor #IT und #TK

"“The #Israeli #military uses Microsoft #Azure to compile information gathered through mass #surveillance, which it transcribes and translates, including phone calls, texts and audio messages, according to an Israeli #intelligence officer who works with the systems. That data can then be cross-checked with #Israel’s in-house targeting systems.”

Microsoft AI also powers the most “sensitive and highly classified projects” for..."
theverge.com/news/643670/micro

A protestor disrupts a Microsoft event.
The Verge · Microsoft employee disrupts 50th anniversary and calls AI boss ‘war profiteer’By Tom Warren

Mit der Rückkehr von Donald #Trump ins Weiße Haus wird die Abhängigkeit von #US-#Cloud-Diensten zu einem wachsenden Problem.
Denn der
#CloudAct zwingt US-amerikanische Firmen Anweisungen von US-Behörden Folge zu leisten, ganz gleich wo deren #Server stehen.

Nicht nur Staaten und Unternehmen, sondern auch Privatpersonen sind betroffen.

Angefangen bei #Datenspeichern über #Online-#Office-Anwendungen bis zu grundlegenden Internetdiensten wie #DNS oder Zertifizierungsstellen.

Es betrifft selbst smarte Geräte wie #WLAN-Steckdosen, wenn deren zentralen Dienste auf einem #Hyperscaler wie #Amazon #AWS oder #Microsoft #Azure liegen.

Doch es gibt Möglichkeiten, den #Datenabfluss zu minimieren und #Alternativen zu nutzen.


Welche das sind, erläutert c’t Redakteur Peter Siering. Die Optionen reichen von #Suchmaschinen über europäische Cloud-Speicher und Open-Source-Projekte bis zu dezentralen, sichereren #Messengern.

youtube.com/watch?v=5i2eLjLKl2

@switchingsoftware

@bfdi !!
@bsi !!

Interesting in more than one way:

ITK (#Aarhus Municipality's department for Innovation, Technology and Creativity, together with Culture and Citizen Services in Aarhus Municipality, are moving their #cloud hosting from #Azure to Hetzner.
In addition to making the necessary move from the #US to #Europe, this will "reduce cloud costs by as much as 2/3."

#sovereignity
#techsovereignity
#europeanAlternatives
#Denmark #Danmark
#LeaveMicrosoft

itk.aarhus.dk/nyheder/projektn

via @floe

itk.aarhus.dkITK skifter til europæisk cloud-hosting leverandørITK tager sammen med Kultur og Borgerservice i Aarhus Kommune konsekvensen af uroen mellem EU og USA og flytter cloud-hosting fra Azure til Hetzner.

Oho, the city of Aarhus is ditching Azure and migrates their cloud platform to a EU provider. Good move 👌

(Obviously easier if you're already running your own services and not relying on Outlook and Teams.)

ITK skifter til europæisk cloud-hosting leverandør
itk.aarhus.dk/nyheder/projektn

itk.aarhus.dkITK skifter til europæisk cloud-hosting leverandørITK tager sammen med Kultur og Borgerservice i Aarhus Kommune konsekvensen af uroen mellem EU og USA og flytter cloud-hosting fra Azure til Hetzner.

Day 422. #Azure recently introduced new features for #Azure DNS Virtual Network Links which are only available in API version "2024-06-01" or higher, but of course that API version is not documented anywhere. According to the Azure docs the latest API version is "2018-09-01".

Slow password spray attack evaded detection by limiting login attempts per user and rotating IPs in Azure CLI. Tenant-wide log analysis revealed 24 accounts targeted in a stealth campaign. Highlights the need for broader detection strategies.

petrasecurity.substack.com/p/u

Microsoft Detection Deep Dives · Unmasking A Slow and Steady Password Spray AttackBy Adithya Vellal

(sophos.com) Evilginx: How Attackers Bypass MFA Through Adversary-in-the-Middle Attacks news.sophos.com/en-us/2025/03/

A short descriptive article about Evilginx and how stealing credentials work, a few suggested ways of detecting etc.

Summary:
This article examines Evilginx, a tool that leverages the legitimate nginx web server to conduct Adversary-in-the-Middle (AitM) attacks that can bypass multifactor authentication (MFA). The tool works by proxying web traffic through malicious sites that mimic legitimate services like Microsoft 365, capturing not only usernames and passwords but also session tokens. The article demonstrates how Evilginx operates, showing how attackers can gain full access to a user's account even when protected by MFA. It provides detection methods through Azure/Microsoft 365 logs and suggests both preemptive and reactive mitigations, emphasizing the need to move toward phishing-resistant FIDO2-based authentication methods.

Sophos News · Stealing user credentials with evilginxA malevolent mutation of the widely used nginx web server facilitates Adversary-in-the-Middle action, but there’s hope