![]() |
Security NoiseAuthor: TrustedSec
In the security industry, it's easy to get overwhelmed by the constant barrage of information and buzzy trends. On Security Noise, we help you sort through the noise and identify the information that truly matters. Listen to hear from practitioners in the field who are using the latest tools and methodologies to stay ahead. Whether you're a seasoned security pro or an industry newcomer, our podcast has something for anyone in the business of making the world secure. Presented by TrustedSec, an end-to-end cybersecurity consulting company using our expertise, technical skills, and ethical character to secure what's important and achieve what matters. Language: en Genres: News, Tech News, Technology Contact email: Get it Feed URL: Get it iTunes ID: Get it |
Listen Now...
8.13 - A Goblin, a Ghost, and a Ninja Walk into the Azure Bar
Episode 13
Monday, 6 April, 2026
On this episode of Security Noise, Geoff and Skyler are joined by NyxGeek to discuss his suite of Azure bypass techniques that focus on user enumeration (which sometimes border on absurd). Since these techniques leave no trace, what does it mean to the organizations trusting authentication logs? We also discuss Microsoft's response to his findings and Geoff's suspicion that he may be responsible for a couple of table flips over at the MS HQ. Read NyxGeek's latest blog here: https://trustedsec.com/blog/full-disclosure-a-third-and-fourth-azure-sign-in-log-bypass-found About this podcast: Security Noise, a TrustedSec Podcast hosted by Geoff Walton and Producer/Contributor Skyler Tuter, features our cybersecurity experts in conversation about the infosec topics that interest them the most. Find more cybersecurity resources on our website at https://trustedsec.com/resources.










