Skip to content
  • Home
  • LinkedIn
PotSolutions
  • Home
  • LinkedIn

Posts in vulnerability

by jpot
December 23, 2024

The G-Door: Microsoft 365 & the risk of unmanaged Google Doc accounts

It’s time to secure Google Workspace—even if you’re not using it. Read about our recent discovered vulnerability, called 'G-Door', which allows users to bypass Microsoft 365 conditional access rules.
0
read more
by jpot
July 24, 2024

IT-Boost TOTP Secret Exposure

Recently, I found a security issue with the way IT-Boost handles TOTP secrets. IT-Boost can calculate […]
0
read more

Recent Posts

  • The G-Door: Microsoft 365 & the risk of unmanaged Google Doc accounts
  • Automating Azure SQL Maintenance with Azure Automation
  • Malware Analysis – Shortcuts in zip file
  • Identifying Duplicate Files Across All SharePoint Sites Using PowerShell
  • How to Guard Against Token Theft for Microsoft 365

Recent Comments

  1. Marie Darr on Microsoft Sentinel: Malicious Inbox Rule V2
  2. prof-it on Microsoft Sentinel: Malicious Inbox Rule V2
  3. Teresa Butler on Microsoft Sentinel: Malicious Inbox Rule V2
  4. prof-it on Microsoft Sentinel: Malicious Inbox Rule V2
  5. Mike Bianco on Microsoft Sentinel: Malicious Inbox Rule V2
© 2025 PotSolutions.