spencer (@techspence) 's Twitter Profile
spencer

@techspence

🛡️Empowering defenders & dismantling threats | Ethical Threat | pentester @securit360 | host @cyberthreatpov | SWAG ethicalthreat.etsy.com

ID: 214967582

linkhttps://spenceralessi.kit.com/twitter calendar_today12-11-2010 17:35:39

35,35K Tweet

9,9K Takipçi

2,2K Takip Edilen

FBI (@fbi) 's Twitter Profile Photo

This week, the FBI disrupted LummaC2, a popular infostealer service, which conducted millions of attacks against victims. With help from partners like Microsoft, the FBI is fulfilling its mission to disrupt key services in the cybercriminal ecosystem: justice.gov/opa/pr/justice…

This week, the FBI disrupted LummaC2, a popular infostealer service, which conducted millions of attacks against victims. With help from partners like Microsoft, the FBI is fulfilling its mission to disrupt key services in the cybercriminal ecosystem: justice.gov/opa/pr/justice…
Joe (@joedibley2) 's Twitter Profile Photo

We just released a new beta build for PingCastle on GitHub to detect the new BadSuccessor risk that Yuval Gordon found! github.com/netwrix/pingca… Code is in the BadSuccessor branch.

spencer (@techspence) 's Twitter Profile Photo

Deception isn’t fluff… it’s friction. And friction slows attackers down, gives defenders an edge, and buys you time. The whole point is to make them second guess their actions, make them have to perform more actions and hopefully increase the chances of detection

Robert Graham (@erratarob) 's Twitter Profile Photo

We are decades past the point where Windows Local Admin rights should be removed. If you have Local Admin enabled, ransomware will spread in ways it couldn't have had you removed them. It's an incredible risk to the entire organization.

LuemmelSec (@theluemmel) 's Twitter Profile Photo

Took Akamai Security Intelligence Group's script for BadSuccessor and improved it a bit. - runs from non domain joined systems - works in forests - prints the rights each entity has on a OU - pre-flight check if 2025 DCs are present - code changes here and there github.com/LuemmelSec/Pen…

Took <a href="/akamai_research/">Akamai Security Intelligence Group</a>'s script for BadSuccessor and improved it a bit. 
- runs from non domain joined systems
- works in forests 
- prints the rights each entity has on a OU
- pre-flight check if 2025 DCs are present
- code changes here and there
github.com/LuemmelSec/Pen…
spencer (@techspence) 's Twitter Profile Photo

You know you're doing this security thing right....or horribly terribly wrong when you log into your VM and upon logon to a host you see this... Did I do that? 🤔😅

You know you're doing this security thing right....or horribly  terribly wrong when you log into your VM and upon logon to a host you see this...

Did I do that? 🤔😅
rez0 (@rez0__) 's Twitter Profile Photo

root. for. your. friends. 🤼 it's more than a phrase, it's a deeply held belief. it's way of living, really. if you want to reject jealousy and thrive in your work and relationships, check out my latest blog post.

root. for. your. friends. 🤼

it's more than a phrase, it's a deeply held belief. it's way of living, really. 

if you want to reject jealousy and thrive in your work and relationships, check out my latest blog post.
spencer (@techspence) 's Twitter Profile Photo

🔍S.C.A.N. - something I came up with to help think through, process and make use of threat reports. Mostly for defenders. S-kim the report C-onfirm what's real/relevant A-nalyze it in the context of your environment N-eutralize risk by implementing controls & mitigations I

spencer (@techspence) 's Twitter Profile Photo

I was trying to get ChatGPT to create mock-ups of heatmaps or "x-rays" I can use to better articulate where specific risks/vulns/misconfigs are present. This is my first attempt...is it wrong? 😅😂

I was trying to get ChatGPT to create mock-ups of heatmaps or "x-rays" I can use to better articulate where specific risks/vulns/misconfigs are present. This is my first attempt...is it wrong? 😅😂
spencer (@techspence) 's Twitter Profile Photo

Incentives are the most powerful weapon in cybersecurity. If aligned, groundbreaking work can be done, when misaligned they causes chaos

Samir (@sbousseaden) 's Twitter Profile Photo

nice research & high likely this will be abused ITW, new detections out using new term rule type to alert on first time seen SubjectUserName in last 10 days creating a new dMSA account or modifying the msDS-ManagedAccountPrecededByLink attribute. github.com/elastic/detect…

nice research &amp; high likely this will be abused ITW, new detections out using new term rule type to alert on first time seen SubjectUserName in last 10 days creating a new dMSA account or modifying the msDS-ManagedAccountPrecededByLink attribute.

github.com/elastic/detect…
spencer (@techspence) 's Twitter Profile Photo

I just did an engagement last week where the client was using applocker but had default exclusions allowed like c:\windows\tasks. If you’re using Applocker or WDAC, I highly recommend auditing your policies to ensure you’re not leaving exclusions like this laying around. This

sapir federovsky (@sapirxfed) 's Twitter Profile Photo

I don't know anything. But here I am, talking for 50 minutes about my journey in the security industry, as a woman, and just as a person in its early career. I learned a lot from this conversation. Maybe you will learn something too! In any case, it was so funny and fun🤩❤️