<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>Forem: Susilo harjo</title>
    <description>The latest articles on Forem by Susilo harjo (@susiloharjo).</description>
    <link>https://forem.com/susiloharjo</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F1699525%2F86627922-0aea-4d84-a08f-ffcf10067a0a.jpg</url>
      <title>Forem: Susilo harjo</title>
      <link>https://forem.com/susiloharjo</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://forem.com/feed/susiloharjo"/>
    <language>en</language>
    <item>
      <title>Migrate IoT Fleet to eSIM: Thales-Simetric Playbook</title>
      <dc:creator>Susilo harjo</dc:creator>
      <pubDate>Sat, 23 May 2026 23:57:00 +0000</pubDate>
      <link>https://forem.com/susiloharjo/migrate-iot-fleet-to-esim-thales-simetric-playbook-4bh</link>
      <guid>https://forem.com/susiloharjo/migrate-iot-fleet-to-esim-thales-simetric-playbook-4bh</guid>
      <description>&lt;h2&gt;
  
  
  Migrate Your IoT Fleet to eSIM: A Thales-Simetric Playbook
&lt;/h2&gt;

&lt;p&gt;Managing thousands of IoT devices across multiple regions and mobile network operators is one of enterprise IoT's hardest problems. Thales and Simetric's unified connectivity platform — combining Thales eSIM infrastructure with Simetric's Single Pane of Glass management — provides a practical migration path.&lt;/p&gt;

&lt;h3&gt;
  
  
  The Migration Playbook
&lt;/h3&gt;

&lt;p&gt;&lt;strong&gt;Step 1 — Audit:&lt;/strong&gt; Document all devices, MNOs, regions, and monthly SIM swap incidents. You need a baseline to justify ROI.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Step 2 — Classify devices into three tiers:&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Tier 1:&lt;/strong&gt; New deployments — specify eSIM with SGP.32 in RFQs&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Tier 2:&lt;/strong&gt; Replaceable during maintenance — swap modules (~$15-25/device)&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Tier 3:&lt;/strong&gt; Stays on physical SIM until retirement&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;60-70% on eSIM within 18 months captures 80% of the benefits.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Step 3 — Select coverage partners:&lt;/strong&gt; Map your geographic footprint to MNOs. The eSIM Advanced Subscription Orchestrator (eSO) handles profile switching based on signal, cost, and SLA parameters.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Step 4 — Define policies:&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Cost-optimized (prefer cheapest, switch on failure)&lt;/li&gt;
&lt;li&gt;Performance-optimized (lowest latency, 20% cost premium)&lt;/li&gt;
&lt;li&gt;Regulatory-compliant (data stays in-country)&lt;/li&gt;
&lt;li&gt;Resilience-first (dual simultaneous connections)&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Step 5 — Pilot:&lt;/strong&gt; 100 devices, 2-3 regions, 30 days. Test profile switching, dashboard load, and cost parity.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Step 6 — Wave migration:&lt;/strong&gt; 500-1,000 devices/week, starting with least critical. 48-hour stabilization between waves.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Step 7 — Decommission legacy MNO contracts&lt;/strong&gt; as devices migrate. ROI materializes here.&lt;/p&gt;

&lt;h3&gt;
  
  
  The Utilities Provider Case
&lt;/h3&gt;

&lt;p&gt;One global operator reported: 40% reduction in management overhead, 72% faster incident resolution, zero-touch provisioning for new devices, and a single SLA monitoring interface across all MNOs.&lt;/p&gt;

&lt;p&gt;For fleets over 1,000 devices across more than 2 MNOs, eSIM migration pays for itself within 12-18 months.&lt;/p&gt;




&lt;p&gt;&lt;em&gt;Originally published at &lt;a href="https://susiloharjo.web.id" rel="noopener noreferrer"&gt;susiloharjo.web.id&lt;/a&gt;. Follow for more IoT and edge computing guides.&lt;/em&gt;&lt;/p&gt;

</description>
      <category>iot</category>
      <category>esim</category>
      <category>connectivity</category>
      <category>devops</category>
    </item>
    <item>
      <title>Defend Against LiteSpeed CVE-2026-48172 Root Exploit</title>
      <dc:creator>Susilo harjo</dc:creator>
      <pubDate>Sat, 23 May 2026 23:56:14 +0000</pubDate>
      <link>https://forem.com/susiloharjo/defend-against-litespeed-cve-2026-48172-root-exploit-2g3b</link>
      <guid>https://forem.com/susiloharjo/defend-against-litespeed-cve-2026-48172-root-exploit-2g3b</guid>
      <description>&lt;h2&gt;
  
  
  Defend Against LiteSpeed CVE-2026-48172 Root Exploit
&lt;/h2&gt;

&lt;p&gt;A maximum-severity vulnerability in the LiteSpeed User-End cPanel Plugin has hit active exploitation, enabling any cPanel user to execute arbitrary scripts with root privileges. Tracked as CVE-2026-48172 (CVSS 10.0), it affects all plugin versions 2.3 through 2.4.4.&lt;/p&gt;

&lt;h3&gt;
  
  
  Detection
&lt;/h3&gt;



&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;&lt;span class="nb"&gt;grep&lt;/span&gt; &lt;span class="nt"&gt;-rE&lt;/span&gt; &lt;span class="s2"&gt;"cpanel_jsonapi_func=redisAble"&lt;/span&gt; /var/cpanel/logs /usr/local/cpanel/logs/ 2&amp;gt;/dev/null
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;No output = unaffected. Any output = investigate those IPs immediately.&lt;/p&gt;

&lt;h3&gt;
  
  
  Patching
&lt;/h3&gt;

&lt;p&gt;&lt;strong&gt;Upgrade (recommended):&lt;/strong&gt;&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;/usr/local/lsws/admin/misc/lsup.sh &lt;span class="nt"&gt;-f&lt;/span&gt; &lt;span class="nt"&gt;-v&lt;/span&gt; 6.3.1
systemctl restart lsws
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;&lt;strong&gt;Uninstall if upgrade blocked:&lt;/strong&gt;&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;/usr/local/lsws/admin/misc/lscmctl cpanelplugin &lt;span class="nt"&gt;--uninstall&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;&lt;strong&gt;WAF virtual patch (temporary):&lt;/strong&gt;&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight apache"&gt;&lt;code&gt;SecRule &lt;span class="ss"&gt;REQUEST_URI&lt;/span&gt; "@contains cpanel_jsonapi_func=redisAble" "id:1000001,phase:2,deny,status:403"
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;h3&gt;
  
  
  If Compromised
&lt;/h3&gt;

&lt;ol&gt;
&lt;li&gt;Isolate: iptables block all suspicious IPs from detection output&lt;/li&gt;
&lt;li&gt;Audit: check crontabs, modified binaries (&lt;code&gt;rpm -Va&lt;/code&gt;), unauthorized SSH keys, new systemd services&lt;/li&gt;
&lt;li&gt;Scan: &lt;code&gt;find /home -name "*.php" -newer [known-good-backup] -exec grep -l "eval\|base64_decode\|system" {} \;&lt;/code&gt;
&lt;/li&gt;
&lt;li&gt;Rotate: every credential on the server&lt;/li&gt;
&lt;/ol&gt;

&lt;h3&gt;
  
  
  The Bigger Picture
&lt;/h3&gt;

&lt;p&gt;CVE-2026-48172 arrives weeks after CVE-2026-41940 (CVSS 9.8) was exploited for Mirai botnet and ransomware deployment. cPanel plugins are an expanding attack surface — each installed plugin bridges user-space to root. Audit monthly, remove unused plugins, deploy ModSecurity with OWASP CRS, and subscribe to LiteSpeed-specific security announcements (they don't always reach mainstream CVE feeds quickly).&lt;/p&gt;




&lt;p&gt;&lt;em&gt;Originally published at &lt;a href="https://susiloharjo.web.id" rel="noopener noreferrer"&gt;susiloharjo.web.id&lt;/a&gt;. Follow for more cybersecurity defense guides.&lt;/em&gt;&lt;/p&gt;

</description>
      <category>cybersecurity</category>
      <category>websecurity</category>
      <category>vulnerability</category>
      <category>devops</category>
    </item>
    <item>
      <title>Build Real-Time AI Media Projects with Gemini Omni</title>
      <dc:creator>Susilo harjo</dc:creator>
      <pubDate>Sat, 23 May 2026 23:56:13 +0000</pubDate>
      <link>https://forem.com/susiloharjo/build-real-time-ai-media-projects-with-gemini-omni-3358</link>
      <guid>https://forem.com/susiloharjo/build-real-time-ai-media-projects-with-gemini-omni-3358</guid>
      <description>&lt;h2&gt;
  
  
  Build Real-Time AI Media Projects with Gemini Omni
&lt;/h2&gt;

&lt;p&gt;Google I/O 2026 introduced Gemini Omni, a new family of generative models capable of transforming any type of input into any type of output — text to video, image to audio, code to 3D scene, and everything in between. Hands-on demos showed the model turning a stuffed animal photo into a vacation video with startling realism and minimal prompting. The developer opportunity is significant: Omni's any-to-any pipeline opens application architectures previously impossible without stitching together multiple models.&lt;/p&gt;

&lt;h3&gt;
  
  
  What Makes Omni Different
&lt;/h3&gt;

&lt;p&gt;Unlike earlier multimodal models that handled specific pairings, Omni uses a unified token representation for all modalities. Input tokens from video frames, audio, text, and images are projected into the same embedding space as output tokens, enabling cross-modal generation with a single API call. Available through Google's Gemini API with SDKs for Python, Node.js, and Go.&lt;/p&gt;

&lt;h3&gt;
  
  
  5 Projects to Build
&lt;/h3&gt;

&lt;p&gt;&lt;strong&gt;1. Real-Time Video Style Transfer:&lt;/strong&gt; Capture webcam frames, send every 6th to Omni for artistic styling, interpolate between keyframes with RIFE for ~12fps styled output. Use cases: live streaming filters, virtual event production.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;2. Multimodal Content Moderation:&lt;/strong&gt; Submit all user-generated content as a single Omni prompt. The model evaluates combined semantic meaning across text, images, and video — catching context-dependent violations that siloed checkers miss. Output structured JSON with violation categories.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;3. Interactive Educational Content:&lt;/strong&gt; Upload a textbook page snapshot. Omni generates a 2-minute explainer video with voiceover, animated diagrams, and quiz questions in one pass. Previously required 5+ separate services.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;4. Automated Localization with Voice Cloning:&lt;/strong&gt; Localize product demos to 40+ languages while preserving speaker voice and lip-sync. A single API call replaces transcription, translation, TTS, and video editing services.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;5. Personalized Media Feed Generator:&lt;/strong&gt; Users describe what they want ("calm cooking videos, no talking, ambient sounds"). Omni generates a continuous personalized feed mixing curated real content with AI-generated fill.&lt;/p&gt;

&lt;h3&gt;
  
  
  Getting Started
&lt;/h3&gt;



&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight python"&gt;&lt;code&gt;&lt;span class="kn"&gt;import&lt;/span&gt; &lt;span class="n"&gt;google.generativeai&lt;/span&gt; &lt;span class="k"&gt;as&lt;/span&gt; &lt;span class="n"&gt;genai&lt;/span&gt;
&lt;span class="n"&gt;model&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="n"&gt;genai&lt;/span&gt;&lt;span class="p"&gt;.&lt;/span&gt;&lt;span class="nc"&gt;GenerativeModel&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="sh"&gt;"&lt;/span&gt;&lt;span class="s"&gt;gemini-omni-pro&lt;/span&gt;&lt;span class="sh"&gt;"&lt;/span&gt;&lt;span class="p"&gt;)&lt;/span&gt;
&lt;span class="n"&gt;response&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="n"&gt;model&lt;/span&gt;&lt;span class="p"&gt;.&lt;/span&gt;&lt;span class="nf"&gt;generate_content&lt;/span&gt;&lt;span class="p"&gt;([&lt;/span&gt;
    &lt;span class="sh"&gt;"&lt;/span&gt;&lt;span class="s"&gt;Turn this whiteboard sketch into a React component&lt;/span&gt;&lt;span class="sh"&gt;"&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;
    &lt;span class="n"&gt;Image&lt;/span&gt;&lt;span class="p"&gt;.&lt;/span&gt;&lt;span class="nf"&gt;open&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="sh"&gt;"&lt;/span&gt;&lt;span class="s"&gt;whiteboard.jpg&lt;/span&gt;&lt;span class="sh"&gt;"&lt;/span&gt;&lt;span class="p"&gt;)&lt;/span&gt;
&lt;span class="p"&gt;])&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Omni represents a step change in single-API-call capability. Combined with Google's Antigravity 2.0 agent platform, it provides the generation backbone for autonomous developer workflows.&lt;/p&gt;




&lt;p&gt;&lt;em&gt;Originally published at &lt;a href="https://susiloharjo.web.id" rel="noopener noreferrer"&gt;susiloharjo.web.id&lt;/a&gt;. Follow for more AI development guides.&lt;/em&gt;&lt;/p&gt;

</description>
      <category>ai</category>
      <category>generativeai</category>
      <category>googleai</category>
      <category>programming</category>
    </item>
    <item>
      <title>Defend Against YellowKey: BitLocker Bypass Fix</title>
      <dc:creator>Susilo harjo</dc:creator>
      <pubDate>Fri, 22 May 2026 23:52:21 +0000</pubDate>
      <link>https://forem.com/susiloharjo/defend-against-yellowkey-bitlocker-bypass-fix-34bf</link>
      <guid>https://forem.com/susiloharjo/defend-against-yellowkey-bitlocker-bypass-fix-34bf</guid>
      <description>&lt;p&gt;Defend Against YellowKey: BitLocker Bypass Fix CVE-2026-45585 — dubbed “YellowKey” — is a zero-day BitLocker security feature bypass that Microsoft confirmed on May 20, 2026. It carries a CVSS score of 6.8 (Medium-High), but the real-world risk for organizations handling sensitive data on Windows endpoints is substantially higher. This isn’t a remote exploit.&lt;/p&gt;

&lt;h2&gt;
  
  
  Key Takeaways
&lt;/h2&gt;

&lt;ol&gt;
&lt;li&gt;&lt;p&gt;Defend Against YellowKey: BitLocker Bypass Fix CVE-2026-45585 — dubbed “YellowKey” — is a zero-day BitLocker security feature bypass that Microsoft confirmed on May 20, 2026.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;It’s a physical-access attack that allows an adversary with brief unsupervised access to a device to bypass BitLocker’s encryption and extract the drive contents.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;No CVE-mapped patch exists as of publication.&lt;/p&gt;&lt;/li&gt;
&lt;/ol&gt;

&lt;h2&gt;
  
  
  Bottom Line
&lt;/h2&gt;

&lt;p&gt;Defend Against YellowKey: BitLocker Bypass Fix is a signal worth watching in 2026. If you're building or securing infrastructure, keep an eye on this trend.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Read the full analysis on &lt;a href="https://susiloharjo.web.id/yellowkey-bitlocker-bypass-defense-2026/" rel="noopener noreferrer"&gt;Susiloharjo&lt;/a&gt;.&lt;/em&gt;&lt;/p&gt;

</description>
      <category>cybersecurity</category>
      <category>windows</category>
      <category>security</category>
      <category>infosec</category>
    </item>
    <item>
      <title>5 Agent Projects to Build with Gemini 3.5 Flash</title>
      <dc:creator>Susilo harjo</dc:creator>
      <pubDate>Fri, 22 May 2026 23:51:55 +0000</pubDate>
      <link>https://forem.com/susiloharjo/5-agent-projects-to-build-with-gemini-35-flash-166f</link>
      <guid>https://forem.com/susiloharjo/5-agent-projects-to-build-with-gemini-35-flash-166f</guid>
      <description>&lt;p&gt;5 Agent Projects to Build with Gemini 3.5 Flash Google dropped Gemini 3.5 Flash at I/O 2026, and the numbers are eye-popping: it beats the flagship Gemini 3.5 Pro on coding and agentic benchmarks while running four times faster and at half the cost. But this isn’t just another benchmark victory lap — it’s a model purpose-built for the agent era. Developers who treat it as “cheaper auto-complete” are missing the point entirely.&lt;/p&gt;

&lt;h2&gt;
  
  
  Key Takeaways
&lt;/h2&gt;

&lt;ol&gt;
&lt;li&gt;&lt;p&gt;5 Agent Projects to Build with Gemini 3.5 Flash Google dropped Gemini 3.5 Flash at I/O 2026, and the numbers are eye-popping: it beats the flagship Gemini 3.5 Pro on coding and agentic benchmarks while running four times faster and at half the cost.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;But this isn’t just another benchmark victory lap — it’s a model purpose-built for the agent era.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Google’s own Antigravity 2.0 platform demonstrates what this shift looks like at scale: agent-first development where models plan, execute, and iterate autonomously.&lt;/p&gt;&lt;/li&gt;
&lt;/ol&gt;

&lt;h2&gt;
  
  
  Bottom Line
&lt;/h2&gt;

&lt;p&gt;5 Agent Projects to Build with Gemini 3.5 Flash is a signal worth watching in 2026. If you're building or securing infrastructure, keep an eye on this trend.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Read the full analysis on &lt;a href="https://susiloharjo.web.id/build-agent-projects-gemini-3-5-flash-2026/" rel="noopener noreferrer"&gt;Susiloharjo&lt;/a&gt;.&lt;/em&gt;&lt;/p&gt;

</description>
      <category>ai</category>
      <category>google</category>
      <category>programming</category>
      <category>gemini</category>
    </item>
    <item>
      <title>Audit Your Factory Data: Stop the Productivity Paradox</title>
      <dc:creator>Susilo harjo</dc:creator>
      <pubDate>Fri, 22 May 2026 23:51:48 +0000</pubDate>
      <link>https://forem.com/susiloharjo/audit-your-factory-data-stop-the-productivity-paradox-59cj</link>
      <guid>https://forem.com/susiloharjo/audit-your-factory-data-stop-the-productivity-paradox-59cj</guid>
      <description>&lt;p&gt;Audit Your Factory Data: Stop the Productivity Paradox Manufacturing leaders spent the last decade convinced that more sensors, more dashboards, and more data would unlock efficiency. The ARC Industry Leadership Forum 2026 just confirmed what many engineers already suspected: more data often creates more waste. The “productivity paradox” in manufacturing is real and measurable.&lt;/p&gt;

&lt;h2&gt;
  
  
  Key Takeaways
&lt;/h2&gt;

&lt;ol&gt;
&lt;li&gt;&lt;p&gt;Audit Your Factory Data: Stop the Productivity Paradox Manufacturing leaders spent the last decade convinced that more sensors, more dashboards, and more data would unlock efficiency.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Despite the proliferation of IIoT sensors, edge gateways, and cloud analytics, frontline teams now spend more time interpreting conflicting dashboards than they do improving actual processes.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;This isn’t a technology failure — it’s a data architecture failure.&lt;/p&gt;&lt;/li&gt;
&lt;/ol&gt;

&lt;h2&gt;
  
  
  Bottom Line
&lt;/h2&gt;

&lt;p&gt;Audit Your Factory Data: Stop the Productivity Paradox is a signal worth watching in 2026. If you're building or securing infrastructure, keep an eye on this trend.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Read the full analysis on &lt;a href="https://susiloharjo.web.id/factory-data-productivity-paradox-audit-2026/" rel="noopener noreferrer"&gt;Susiloharjo&lt;/a&gt;.&lt;/em&gt;&lt;/p&gt;

</description>
      <category>iot</category>
      <category>manufacturing</category>
      <category>dataengineering</category>
      <category>industrialtech</category>
    </item>
    <item>
      <title>Telia’s Sovereign IoT Service Keeps Data Inside Sweden</title>
      <dc:creator>Susilo harjo</dc:creator>
      <pubDate>Fri, 22 May 2026 00:40:42 +0000</pubDate>
      <link>https://forem.com/susiloharjo/telia8217s-sovereign-iot-service-keeps-data-inside-sweden-5a8p</link>
      <guid>https://forem.com/susiloharjo/telia8217s-sovereign-iot-service-keeps-data-inside-sweden-5a8p</guid>
      <description>&lt;p&gt;— Telia's Sovereign IoT Service Keeps Data Inside Sweden Telia has launched Telia IoT Connect, a sovereign Internet of Things service where connectivity and data are fully managed within Sweden’s borders. Available as of May 21, 2026, the service targets organizations that require secure and resilient IoT communication for business-critical and mission-critical use cases — a category that increasingly includes energy grids, transportation networks, manufacturing floors, and public infrastructure. Built on Telia’s nationwide 4G and 5G networks, the platform consolidates connectivity, operations, and data management into a single nationally-bounded infrastructure.&lt;/p&gt;

&lt;h2&gt;
  
  
  Key Takeaways
&lt;/h2&gt;

&lt;ol&gt;
&lt;li&gt;&lt;p&gt;— Telia's Sovereign IoT Service Keeps Data Inside Sweden Telia has launched Telia IoT Connect, a sovereign Internet of Things service where connectivity and data are fully managed within Sweden’s borders.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Available as of May 21, 2026, the service targets organizations that require secure and resilient IoT communication for business-critical and mission-critical use cases — a category that increasingly includes energy grids, transportation networks, manufacturing floors, and public infrastructure.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Built on Telia’s nationwide 4G and 5G networks, the platform consolidates connectivity, operations, and data management into a single nationally-bounded infrastructure.&lt;/p&gt;&lt;/li&gt;
&lt;/ol&gt;

&lt;h2&gt;
  
  
  Bottom Line
&lt;/h2&gt;

&lt;p&gt;Telia’s Sovereign IoT Service Keeps Data Inside Sweden is a signal that iot is accelerating fast in 2026. If you're building or securing infrastructure, this trend is worth watching closely.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Read the full analysis on &lt;a href="https://susiloharjo.web.id/telia-sovereign-iot-sweden-infrastructure-2026/" rel="noopener noreferrer"&gt;Susiloharjo&lt;/a&gt;.&lt;/em&gt;&lt;/p&gt;

</description>
      <category>iot</category>
      <category>telecom</category>
      <category>privacy</category>
      <category>infrastructure</category>
    </item>
    <item>
      <title>Nx Console VS Code Extension Hit by Supply Chain Attack</title>
      <dc:creator>Susilo harjo</dc:creator>
      <pubDate>Fri, 22 May 2026 00:39:57 +0000</pubDate>
      <link>https://forem.com/susiloharjo/nx-console-vs-code-extension-hit-by-supply-chain-attack-5cid</link>
      <guid>https://forem.com/susiloharjo/nx-console-vs-code-extension-hit-by-supply-chain-attack-5cid</guid>
      <description>&lt;p&gt;— Nx Console VS Code Extension Hit by Supply Chain Attack Cybersecurity researchers have flagged a compromised version of the Nx Console extension published to the Microsoft Visual Studio Code Marketplace. The extension in question — rwl.angular-console version 18.95.0 — has more than 2.2 million installations and serves as a popular user interface for Nx monorepo management across VS Code, Cursor, and JetBrains editors. The Open VSX version was not affected by the incident.&lt;/p&gt;

&lt;h2&gt;
  
  
  Key Takeaways
&lt;/h2&gt;

&lt;ol&gt;
&lt;li&gt;&lt;p&gt;— Nx Console VS Code Extension Hit by Supply Chain Attack Cybersecurity researchers have flagged a compromised version of the Nx Console extension published to the Microsoft Visual Studio Code Marketplace.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;The extension in question — rwl.angular-console version 18.95.0 — has more than 2.2 million installations and serves as a popular user interface for Nx monorepo management across VS Code, Cursor, and JetBrains editors.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Attack Delivery According to research by StepSecurity, within seconds of a developer opening any workspace, the compromised extension silently fetched and executed a 498 KB obfuscated payload from a dangling orphan commit hidden inside the official nrwl/nx GitHub repository.&lt;/p&gt;&lt;/li&gt;
&lt;/ol&gt;

&lt;h2&gt;
  
  
  Bottom Line
&lt;/h2&gt;

&lt;p&gt;Nx Console VS Code Extension Hit by Supply Chain Attack is a signal that cybersec is accelerating fast in 2026. If you're building or securing infrastructure, this trend is worth watching closely.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Read the full analysis on &lt;a href="https://susiloharjo.web.id/nx-console-vscode-supply-chain-attack-2026/" rel="noopener noreferrer"&gt;Susiloharjo&lt;/a&gt;.&lt;/em&gt;&lt;/p&gt;

</description>
      <category>cybersecurity</category>
      <category>infosec</category>
      <category>vscode</category>
      <category>supplychain</category>
    </item>
    <item>
      <title>Google Antigravity 2.0 Shifts Dev to Agent-First at I/O 2026</title>
      <dc:creator>Susilo harjo</dc:creator>
      <pubDate>Fri, 22 May 2026 00:39:56 +0000</pubDate>
      <link>https://forem.com/susiloharjo/google-antigravity-20-shifts-dev-to-agent-first-at-io-2026-41j3</link>
      <guid>https://forem.com/susiloharjo/google-antigravity-20-shifts-dev-to-agent-first-at-io-2026-41j3</guid>
      <description>&lt;p&gt;— Google Antigravity 2.0 Shifts Dev to Agent-First at I/O 2026 Google used its I/O 2026 developer keynote to ship a fundamental architectural shift in AI-assisted development. The company unveiled Google Antigravity 2.0 — a standalone desktop application built entirely around agent orchestration — alongside an Antigravity CLI, an Antigravity SDK, Managed Agents in the Gemini API, and enterprise support through the Gemini Enterprise Agent Platform. The message was clear: Google is moving developer tooling away from IDE-centric code completion and toward multi-agent workflow management as the primary abstraction.&lt;/p&gt;

&lt;h2&gt;
  
  
  Key Takeaways
&lt;/h2&gt;

&lt;ol&gt;
&lt;li&gt;&lt;p&gt;— Google Antigravity 2.0 Shifts Dev to Agent-First at I/O 2026 Google used its I/O 2026 developer keynote to ship a fundamental architectural shift in AI-assisted development.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;The company unveiled Google Antigravity 2.0 — a standalone desktop application built entirely around agent orchestration — alongside an Antigravity CLI, an Antigravity SDK, Managed Agents in the Gemini API, and enterprise support through the Gemini Enterprise Agent Platform.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;The message was clear: Google is moving developer tooling away from IDE-centric code completion and toward multi-agent workflow management as the primary abstraction.&lt;/p&gt;&lt;/li&gt;
&lt;/ol&gt;

&lt;h2&gt;
  
  
  Bottom Line
&lt;/h2&gt;

&lt;p&gt;Google Antigravity 2.0 Shifts Dev to Agent-First at I/O 2026 is a signal that ai is accelerating fast in 2026. If you're building or securing infrastructure, this trend is worth watching closely.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Read the full analysis on &lt;a href="https://susiloharjo.web.id/google-antigravity-2-0-agent-first-io-2026/" rel="noopener noreferrer"&gt;Susiloharjo&lt;/a&gt;.&lt;/em&gt;&lt;/p&gt;

</description>
      <category>ai</category>
      <category>llm</category>
      <category>google</category>
      <category>developer</category>
    </item>
    <item>
      <title>Google I/O 2026 AI Roundup: Every Feature You Actually Need to Know</title>
      <dc:creator>Susilo harjo</dc:creator>
      <pubDate>Thu, 21 May 2026 00:19:55 +0000</pubDate>
      <link>https://forem.com/susiloharjo/google-io-2026-ai-roundup-every-feature-you-actually-need-to-know-9k6</link>
      <guid>https://forem.com/susiloharjo/google-io-2026-ai-roundup-every-feature-you-actually-need-to-know-9k6</guid>
      <description>&lt;p&gt;Google I/O 2026 was a two-hour AI barrage. Gemini 3.5 Flash, Search AI Mode, Project Astra in Workspace, and a fleet of coding agents. If you blinked, you missed half of it. Here is the practical breakdown — no fluff, just what ships, when it ships, and what it actually means for people building with it.&lt;/p&gt;




&lt;h2&gt;
  
  
  Gemini 3.5 Flash: Cheaper, Faster, Smarter(ish)
&lt;/h2&gt;

&lt;p&gt;The headline upgrade. Gemini 3.5 Flash is Google's new everyday model — 40% cheaper than 3.0 Flash, 2x faster on long-context tasks, and the first Flash-tier model with genuine multimodal reasoning across text, images, audio, and video. It ships with a 1M-token context window and a new Mixture-of-Experts architecture that routes queries to specialized sub-models.&lt;/p&gt;

&lt;p&gt;The practical takeaway: if you were using Gemini 2.5 Flash for cost-sensitive production workloads, 3.5 Flash is a drop-in upgrade. The pricing alone (roughly half the cost per million tokens) makes it the rational default for agent loops, batch inference, and retrieval-augmented generation pipelines.&lt;/p&gt;

&lt;h2&gt;
  
  
  Search AI Mode: The Browser Inside the Chat
&lt;/h2&gt;

&lt;p&gt;Google quietly launched "AI Mode" in Search, and then — more significantly — made it available inside Gemini as a tool. The model can now execute live Google searches autonomously, parse results, and synthesize answers without a human in the loop. This is the same capability OpenAI shipped with ChatGPT Browse, but Google's version has direct access to the Knowledge Graph and indexed web at scale.&lt;/p&gt;

&lt;p&gt;For developers, it means Gemini agents can now self-verify facts, pull real-time pricing, and resolve obscure API documentation without you pre-loading context. It also introduces a new failure mode: agent drift from hallucinated search results. Google claims a 97% factual accuracy rate in internal testing, which is high — but not zero.&lt;/p&gt;

&lt;h2&gt;
  
  
  Project Astra Comes to Workspace
&lt;/h2&gt;

&lt;p&gt;Project Astra, Google's always-on camera-and-screen AI assistant, is graduating from research preview to production. Starting Q3 2026, it will be available in Google Workspace as a persistent sidebar that can see your screen, read your documents, and execute multi-step actions across Gmail, Docs, and Calendar.&lt;/p&gt;

&lt;p&gt;The killer demo: "Summarize this 47-page contract, extract the termination clauses, draft a reply email to the vendor, and schedule a meeting with legal for Tuesday." Astra did it in 18 seconds. This is not a chatbot bolted onto a document viewer — it is genuine screen-aware workflow automation. The privacy implications are enormous (a camera reading your screen constantly) and Google is addressing them with on-device processing for video streams, but enterprise IT teams will have questions.&lt;/p&gt;

&lt;h2&gt;
  
  
  The Coding Agents Landscape
&lt;/h2&gt;

&lt;p&gt;Google shipped three new coding agents: CodeGemma for inline IDE completions, Gemini Code Assist for full-repo context and PR reviews, and a new "Agent Mode" in Android Studio that can build entire features from natural language prompts.&lt;/p&gt;

&lt;p&gt;The quiet revelation: Google is positioning these not as competitors to GitHub Copilot or Cursor, but as &lt;em&gt;platform agents&lt;/em&gt; that integrate with Google Cloud's CI/CD pipeline. Write code in Android Studio, push to Cloud Build, deploy to Cloud Run — all from a single chat interface. The lock-in play is subtle but real.&lt;/p&gt;

&lt;h2&gt;
  
  
  What Wasn't Announced (But Should Have Been)
&lt;/h2&gt;

&lt;p&gt;No pricing transparency for agent API calls. No self-hosted model for regulated industries. No clarity on whether Gemini 3.5 Flash will be available on Vertex AI at the same time as AI Studio, or whether enterprise users face another multi-month gap. And no roadmap for on-device Gemini beyond the Pixel line — Samsung and Qualcomm partnerships remain a question mark.&lt;/p&gt;




&lt;h2&gt;
  
  
  The Bottom Line
&lt;/h2&gt;

&lt;p&gt;Google I/O 2026 was more pragmatic than previous years. Fewer moonshots, more shipping. Gemini 3.5 Flash is genuinely cheaper and faster. Search AI Mode makes agents more autonomous. Astra could genuinely change how office work functions — if enterprises trust the privacy model. The coding agents are solid, if lock-in adjacent.&lt;/p&gt;

&lt;p&gt;For builders: start testing Gemini 3.5 Flash today. For strategists: watch the Q3 Astra rollout. For everyone else: the AI landscape didn't fundamentally shift this week, but it accelerated.&lt;/p&gt;




&lt;p&gt;&lt;strong&gt;Related on Susiloharjo:&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://susiloharjo.web.id/openai-synthid-watermark-verification-ai-images-2026/" rel="noopener noreferrer"&gt;OpenAI Adopts Google's SynthID: Why Watermarking AI Images Is the Easy Part&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://susiloharjo.web.id/lighthouse-attention-the-training-time-hierarchy-that-makes-quadratic-attention-practical-again/" rel="noopener noreferrer"&gt;Lighthouse Attention: The Training-Time Hierarchy That Makes Quadratic Attention Practical Again&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://susiloharjo.web.id/the-ai-coding-agent-reckoning-why-benchmarks-are-broken-and-what-senior-architects-should-do-instead/" rel="noopener noreferrer"&gt;The AI Coding Agent Reckoning: Why Benchmarks Are Broken and What Senior Architects Should Do Instead&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://susiloharjo.web.id/state-of-ai-governance-building-guardrails-for-autonomous-systems/" rel="noopener noreferrer"&gt;State of AI Governance: Building Guardrails for Autonomous Systems&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;




&lt;p&gt;&lt;em&gt;More at &lt;a href="https://susiloharjo.web.id" rel="noopener noreferrer"&gt;susiloharjo.web.id&lt;/a&gt;&lt;/em&gt;&lt;/p&gt;

</description>
      <category>ai</category>
      <category>google</category>
      <category>gemini</category>
      <category>machinelearning</category>
    </item>
    <item>
      <title>NGINX CVE-2026-42945: An 18-Year-Old Heap Overflow Now Actively Exploited</title>
      <dc:creator>Susilo harjo</dc:creator>
      <pubDate>Wed, 20 May 2026 05:53:23 +0000</pubDate>
      <link>https://forem.com/susiloharjo/nginx-cve-2026-42945-an-18-year-old-heap-overflow-now-actively-exploited-1mfk</link>
      <guid>https://forem.com/susiloharjo/nginx-cve-2026-42945-an-18-year-old-heap-overflow-now-actively-exploited-1mfk</guid>
      <description>&lt;h1&gt;
  
  
  NGINX CVE-2026-42945: An 18-Year-Old Heap Overflow Now Actively Exploited
&lt;/h1&gt;

&lt;p&gt;A heap buffer overflow that has existed inside the NGINX codebase since 2008 is now under active exploitation in the wild. Tracked as CVE-2026-42945 and assigned a CVSS score of 9.2, the vulnerability affects the &lt;code&gt;ngx_http_rewrite_module&lt;/code&gt; across all versions of NGINX Open Source and NGINX Plus from 0.6.27 through 1.30.0. Researchers at depthfirst, an AI-native security firm, traced the bug to a commit made nearly two decades ago — meaning it has survived every release cycle, every security audit, and every upgrade NGINX has undergone since.&lt;/p&gt;

&lt;h2&gt;
  
  
  The Technical Picture
&lt;/h2&gt;

&lt;p&gt;The flaw is a classic heap buffer overflow. When an attacker sends a specially crafted HTTP request to a server with a vulnerable rewrite configuration, the request triggers memory corruption on the heap. The immediate consequence is a worker process crash — a reliable denial-of-service vector that requires nothing more than a single malicious request. In more dangerous scenarios, an attacker can leverage the corruption for remote code execution (RCE), potentially running arbitrary commands on the target.&lt;/p&gt;

&lt;p&gt;There is a significant caveat: reliable RCE depends on Address Space Layout Randomization (ASLR) being disabled on the target system. ASLR is enabled by default on every modern Linux distribution, including AlmaLinux, Ubuntu, Debian, and RHEL. AlmaLinux maintainers acknowledged that while "turning the heap overflow into reliable code execution is not trivial in the default configuration," they also warned that "'not easy' is not 'impossible,' and the worker-crash DoS is exploitable enough on its own that we recommend treating this as urgent."&lt;/p&gt;

&lt;h2&gt;
  
  
  Exploitation Is Already Happening
&lt;/h2&gt;

&lt;p&gt;VulnCheck's honeypot network has detected live exploitation attempts just days after the public disclosure. While the campaign's objectives and full scope remain under investigation, the speed of weaponization matches a broader trend: the gap between CVE publication and in-the-wild exploitation has collapsed from months to days.&lt;/p&gt;

&lt;p&gt;NGINX powers roughly one-third of all websites globally. The sheer size of the attack surface — combined with the triviality of triggering the DoS vector — makes this vulnerability especially dangerous for organizations that cannot patch quickly.&lt;/p&gt;

&lt;h2&gt;
  
  
  A Parallel Campaign: openDCIM
&lt;/h2&gt;

&lt;p&gt;VulnCheck simultaneously reported attackers exploiting three chained vulnerabilities in openDCIM, an open-source data center infrastructure management tool:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;CVE-2026-28515&lt;/strong&gt; (CVSS 9.3) — Missing authorization allowing unauthorized LDAP configuration access&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;CVE-2026-28516&lt;/strong&gt; (CVSS 9.3) — SQL injection vulnerability&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;CVE-2026-28517&lt;/strong&gt; (CVSS 9.3) — OS command injection in &lt;code&gt;report_network_map.php&lt;/code&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Chained together, these three flaws enable remote code execution over just five HTTP requests and spawn a reverse shell. VulnCheck observed attackers using an AI-assisted discovery tool (Vulnhuntr) to automate the identification of vulnerable instances and drop PHP web shells. The attack cluster originates from a single Chinese IP address.&lt;/p&gt;

&lt;h2&gt;
  
  
  What to Do Right Now
&lt;/h2&gt;

&lt;p&gt;&lt;strong&gt;Patch immediately.&lt;/strong&gt; F5 has released fixes for all affected NGINX versions. Upgrade to NGINX 1.30.1 or newer for open source deployments, or apply updates through the F5 customer portal for NGINX Plus. Distribution packages from AlmaLinux, Debian, Ubuntu, and RHEL are shipping backported fixes — check your package manager.&lt;/p&gt;

&lt;p&gt;For environments that cannot patch immediately:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Restrict network access to NGINX on ports 80 and 443&lt;/li&gt;
&lt;li&gt;Audit rewrite configurations and disable unnecessary rules&lt;/li&gt;
&lt;li&gt;Verify ASLR is enabled (&lt;code&gt;cat /proc/sys/kernel/randomize_va_space&lt;/code&gt; should return &lt;code&gt;2&lt;/code&gt;)&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;For openDCIM users: take any internet-facing deployment offline until patches are applied. The exploit chain provides reliable remote access to the underlying operating system.&lt;/p&gt;

&lt;h2&gt;
  
  
  The Bigger Lesson
&lt;/h2&gt;

&lt;p&gt;An 18-year-old vulnerability in one of the most trusted pieces of internet infrastructure should reset expectations about software security. Age does not guarantee safety. The patch latency window — now measured in single-digit days — has become the single most important metric for defenders. Organizations that treat every critical CVE as an active, imminent threat are the ones that survive.&lt;/p&gt;




&lt;p&gt;&lt;em&gt;Full article with additional context at &lt;a href="https://susiloharjo.web.id/nginx-cve-2026-42945-exploited-wild-heap-overflow-18-year-old-bug/" rel="noopener noreferrer"&gt;susiloharjo.web.id&lt;/a&gt;.&lt;/em&gt;&lt;/p&gt;

</description>
      <category>cybersecurity</category>
      <category>nginx</category>
      <category>vulnerability</category>
      <category>infosec</category>
    </item>
    <item>
      <title>The CVE That Wasn't: Microsoft's Azure Vulnerability Rejection and the Eroding Trust in Cloud Disclosure</title>
      <dc:creator>Susilo harjo</dc:creator>
      <pubDate>Tue, 19 May 2026 03:24:53 +0000</pubDate>
      <link>https://forem.com/susiloharjo/the-cve-that-wasnt-microsofts-azure-vulnerability-rejection-and-the-eroding-trust-in-cloud-229g</link>
      <guid>https://forem.com/susiloharjo/the-cve-that-wasnt-microsofts-azure-vulnerability-rejection-and-the-eroding-trust-in-cloud-229g</guid>
      <description>&lt;p&gt;&lt;strong&gt;TL;DR:&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;A security researcher discovered a critical cross-tenant access flaw&lt;/strong&gt; in Microsoft Azure's identity management layer, capable of exposing sensitive customer data across organizational boundaries — and provided full technical documentation with proof-of-concept code.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Microsoft's Security Response Center (MSRC) rejected the submission as "by design,"&lt;/strong&gt; classifying the vulnerable behavior as intended functionality rather than a security defect — and declined to issue a CVE identifier.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;The rejection is inconsistent with Microsoft's own historical precedent,&lt;/strong&gt; as substantially similar cross-tenant vulnerabilities in Azure have received CVE assignments and security patches in the past.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;This pattern — classify as "by design," silently patch later — erodes the coordinated vulnerability disclosure ecosystem&lt;/strong&gt; and leaves Azure customers unaware of active risks that attackers may already be exploiting.&lt;/li&gt;
&lt;/ul&gt;




&lt;h2&gt;
  
  
  What the Researcher Found
&lt;/h2&gt;

&lt;p&gt;The vulnerability resided in Azure's cross-tenant access architecture — the mechanisms governing how identities, resources, and permissions interact across organizational boundaries in shared cloud environments. Under specific conditions, an attacker could traverse tenant isolation boundaries to access resources belonging to other Azure customers. The attack path did not require exploiting a misconfiguration on the victim's side; it leveraged behavior present in Azure's own identity and access management plumbing.&lt;/p&gt;

&lt;p&gt;The submission followed the gold standard: detailed technical write-up, step-by-step reproduction, working PoC code, and clear security impact analysis. From an engineering perspective, cross-tenant authorization bypasses are among the highest-severity cloud issues — they undermine the fundamental isolation primitive that the entire multi-tenancy model depends on.&lt;/p&gt;

&lt;h2&gt;
  
  
  The "By Design" Rejection
&lt;/h2&gt;

&lt;p&gt;Microsoft's formal response classified the reported behavior as intended design. The MSRC case was closed without a fix, CVE, or public advisory. This framing is increasingly contentious: every bug reclassified as a design choice is one fewer patch cycle and one less mark on the security track record. But a CVE provides a globally recognized identifier that security teams use to track, assess, and remediate risks. Without one, the finding struggles to propagate through enterprise vulnerability management pipelines.&lt;/p&gt;

&lt;h2&gt;
  
  
  Precedent Contradictions
&lt;/h2&gt;

&lt;p&gt;Azure has issued CVEs for cross-tenant vulnerabilities in the past — including issues in Azure AD, shared key authentication flows, and resource management APIs. The architectural similarity between those acknowledged vulnerabilities and the current finding raises an uncomfortable question: what changed? The distinction between a code-level authorization bug and an architectural authorization gap may matter to engineers, but from the customer's perspective it is academic. If Tenant A can read Tenant B's storage, the taxonomy of the flaw matters less than the fact of the exposure.&lt;/p&gt;

&lt;h2&gt;
  
  
  The Silent Fix Pattern
&lt;/h2&gt;

&lt;p&gt;Multiple documented instances exist where Microsoft rejected a security submission, then quietly addressed the underlying issue in a subsequent Azure update — without credit, CVE, or advisory. This pattern is corrosive: it denies researcher credit, denies customers actionable identifiers for risk assessment, and denies the security community data points for understanding the threat landscape. For engineering teams operating Azure workloads, a silent fix is functionally indistinguishable from an unpatched vulnerability until someone reverse-engineers the update.&lt;/p&gt;




&lt;h2&gt;
  
  
  Engineering Takeaways
&lt;/h2&gt;

&lt;p&gt;Cross-tenant isolation must be treated as an untrusted boundary even when provider documentation asserts otherwise. Penetration tests should explicitly target tenant-boundary traversal, not just application-layer vulnerabilities. Vulnerability management programs that depend solely on CVE feeds should supplement them with direct monitoring of researcher disclosures. The shared responsibility model requires sharper definition — provider-side architectural flaws in tenant isolation are not the customer's responsibility to detect or mitigate. The industry needs clearer norms around when "by design" is a valid technical assessment and when it is a deflection.&lt;/p&gt;




&lt;p&gt;For the complete architectural breakdown — including &lt;strong&gt;the full anatomy of the cross-tenant authorization bypass&lt;/strong&gt;, &lt;strong&gt;a detailed comparison with previously acknowledged Azure CVEs&lt;/strong&gt;, and &lt;strong&gt;a deeper analysis of the silent-fix pattern and its implications for enterprise vulnerability management&lt;/strong&gt; — read the full analysis at susiloharjo.web.id:&lt;/p&gt;

&lt;p&gt;🔗 &lt;a href="https://susiloharjo.web.id/the-cve-that-wasnt-microsofts-azure-vulnerability-rejection-and-the-eroding-trust-in-cloud-disclosure/" rel="noopener noreferrer"&gt;https://susiloharjo.web.id/the-cve-that-wasnt-microsofts-azure-vulnerability-rejection-and-the-eroding-trust-in-cloud-disclosure/&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;For more technical analysis of cloud security, vulnerability disclosure, and enterprise risk management, visit &lt;a href="https://susiloharjo.web.id" rel="noopener noreferrer"&gt;susiloharjo.web.id&lt;/a&gt;.&lt;/p&gt;

</description>
      <category>cybersecurity</category>
      <category>infosec</category>
      <category>security</category>
    </item>
  </channel>
</rss>
