Skip to Main Content

Security Noise - A Goblin, a Ghost, and a Ninja Walk into the Azure Bar

Episode 8.13

By @ nyxgeek, Geoff Walton and Skyler Tuter
April 06, 2026
Cloud Penetration Testing Vulnerability Assessment

On this episode of Security Noise, Geoff and Skyler are joined by NyxGeek to discuss his suite of Azure bypass techniques that focus on user enumeration (which sometimes border on absurd). Since these techniques leave no trace, what does it mean to the organizations trusting authentication logs? We also discuss Microsoft's response to his findings and Geoff's suspicion that he may be responsible for a couple of table flips over at the MS HQ. Read NyxGeek's latest blog here: https://trustedsec.com/blog/full-disclosure-a-third-and-fourth-azure-sign-in-log-bypass-found

About this podcast:

Security Noise, a TrustedSec Podcast hosted by Geoff Walton and Producer/Contributor Skyler Tuter, features our cybersecurity experts in conversation about the infosec topics that interest them the most. Find more cybersecurity resources on our website at https://trustedsec.com/resources.