🏴‍☠️ Alex Benoit 🏴‍☠️ (@itpirate) 's Twitter Profile
🏴‍☠️ Alex Benoit 🏴‍☠️

@itpirate

☠ #Pirate ☠ | Certified Ethical Hacker | Microsoft MVP

ID: 2807428341

linkhttps://www.water-security.de calendar_today05-10-2014 11:36:18

6,6K Tweet

2,2K Takipçi

2,2K Takip Edilen

Florian Hansemann (@cyberwarship) 's Twitter Profile Photo

''Red Teaming in the age of EDR: Evasion of Endpoint Detection Through Malware Virtualisation'' #infosec #pentest #redteam #blueteam blog.fox-it.com/2024/09/25/red…

WorkPlaceNinjaSummit (@wpninjasummit) 's Twitter Profile Photo

In this live episode from #WPNinjaSummit 2024, hosts Frans Oudendorp ☁ | MVP & 🏴‍☠️ Alex Benoit 🏴‍☠️ sit down with Maayan Bar-Niv and Ran Marom to delve into the world of #DefenderForCloudApps and its role in enhancing security across the cloud. Don’t miss this out -> youtu.be/ETrtdGH_D7c?si…

Kostas (@kostastsale) 's Twitter Profile Photo

I created the first draft of a website for the EDR telemetry project to help people quickly compare vendor telemetry visibility. What do you think about it? Are there any specific features you want to see for the website? Built with ChatGPT 4o with canvas (wanted to test it

Microsoft Threat Intelligence (@msftsecintel) 's Twitter Profile Photo

Microsoft observed a 146% rise in adversary-in-the-middle (AiTM) attacks over the last year, indicating that cybercriminals are continuing to find ways to compromise accounts that are protected by multifactor authentication (MFA).

NASA (@nasa) 's Twitter Profile Photo

We're all on this rock together, starting a new orbit around the Sun. Here's to new opportunities, discoveries, and moments of joy in 2025! Happy New Year from all of us at NASA 💫

We're all on this rock together, starting a new orbit around the Sun. Here's to new opportunities, discoveries, and moments of joy in 2025!
 
Happy New Year from all of us at NASA 💫
Fabian Bader (@fabian_bader) 's Twitter Profile Photo

New Defender for Endpoint feature just dropped: Aggregated reporting. This feature seems to bridge a gap of otherwise capped data collected. Check the supported tables also action types in the docs 📖 #XDR #MDE learn.microsoft.com/en-us/defender…

Fabian Bader (@fabian_bader) 's Twitter Profile Photo

Defender for Identity now has an API ▫️List of sensors ▫️Update sensor settings ▫️Get a deployment package ▫️Get the access key ▫️Update the access key ▫️Delete a sensor techcommunity.microsoft.com/blog/microsoft…

Florian Roth ⚡️ (@cyb3rops) 's Twitter Profile Photo

Ransomware actors evading EDR by pivoting through unsupported or unmonitored devices isn’t new. I wrote about this trend repeatedly - most recently in my blog post earlier this year. My team constantly extends our collection methods to detect threats on even the most exotic

Ransomware actors evading EDR by pivoting through unsupported or unmonitored devices isn’t new. I wrote about this trend repeatedly - most recently in my blog post earlier this year.

My team constantly extends our collection methods to detect threats on even the most exotic
BleepingComputer (@bleepincomputer) 's Twitter Profile Photo

Microsoft is testing a new Defender for Endpoint capability that will block traffic to and from undiscovered endpoints to thwart attackers' lateral network movement attempts. bleepingcomputer.com/news/microsoft…

Mark Simos (@marksimos) 's Twitter Profile Photo

April 2025 version of MCRA is out! This release of the Microsoft Cybersecurity Reference Architectures (MCRA) focuses on updates for standards/mappings, product/technology changes, and more. Download PowerPoint (including slide notes) from usual site - aka.ms/MCRA

April 2025 version of MCRA is out!

This release of the Microsoft Cybersecurity Reference Architectures (MCRA) focuses on updates for standards/mappings, product/technology changes, and more. 

Download PowerPoint (including slide notes) from usual site - aka.ms/MCRA
Nıŋʝąƈąɬ 🐈 (@ravivtamir) 's Twitter Profile Photo

Last Thursday, we launched a blog and website addressing how to measure email security effectiveness, given the lack of real-world tests and vendors' push for multi-product solutions. We analyzed the data, and the results are very interesting 🧵 We compared environments

Last Thursday, we launched a blog and website addressing how to measure email security effectiveness, given the lack of real-world tests and vendors' push for multi-product solutions. We analyzed the data, and the results are very interesting 🧵

We compared environments
Nıŋʝąƈąɬ 🐈 (@ravivtamir) 's Twitter Profile Photo

OAuth abuse is rising. Microsoft Defender now helps detect risky grants in Salesforce. A key step in securing cloud identity flows. techcommunity.microsoft.com/blog/microsoft…

BleepingComputer (@bleepincomputer) 's Twitter Profile Photo

A new phishing technique dubbed 'CoPhish' weaponizes Microsoft Copilot Studio agents to deliver fraudulent OAuth consent requests via legitimate and trusted Microsoft domains. Microsoft told BleepingComputer they plan on fixing it in a future update. bleepingcomputer.com/news/security/…