Barry Anderson (@z3ndrag0n) 's Twitter Profile
Barry Anderson

@z3ndrag0n

Husband, Dad, Security Architect. Strong believer in automating things to empower/augment people. SOAR through an Empty Realm - Tao Te Ching. My views. (he/him)

ID: 28731847

calendar_today04-04-2009 03:39:17

47,47K Tweet

1,1K Takipçi

4,4K Takip Edilen

Sean Metcalf (@pyrotek3) 's Twitter Profile Photo

Microsoft supported backups of Active Directory are very important to have. For backing up Domain Controllers, this is typically a System State backup. Why a Microsoft supported backup? If you are using a backup solution that isn't fully AD aware, performing a restore may

Microsoft supported backups of Active Directory are very important to have. For backing up Domain Controllers, this is typically a System State backup.

Why a Microsoft supported backup? If you are using a backup solution that isn't fully AD aware, performing a restore may
Mick Douglas 🇺🇦🌻 (@bettersafetynet) 's Twitter Profile Photo

Protip: Always remember that within cyber security there are many sub specializations. Just because someone is good at one area, they may be completely inept in another. Just because you're techie, doesn't mean you can measure risk. 1

Will (@bushidotoken) 's Twitter Profile Photo

There’s various reports of cybercriminals abusing CrowdStrike RTR, the SentinelOne installer, and the Wazuh SIEM Agent. Seems we could do with a new ATT&CK TTP for this threat. Should be a concern for orgs running any of type of EDR/SIEM agents. (Sources linked below)

spencer (@techspence) 's Twitter Profile Photo

How to harden your environment better than 90% of organizations [Part 1] 1. Run PingCastle 2. Run Locksmith 3. Run ADeleginator Bonus: Run PurpleKnight, AppLocker Inspector (if you use AppLocker), and ScriptSentry (if you have logon scripts) Then fix all the findings. What

ASRC (@asrc1) 's Twitter Profile Photo

🚨 STOP THIS TRUMP-LIKE BILL 🚨 The Albanese Government is rushing through a new Bill that would strip people of their legal and human rights - making it easier to deport vulnerable people seeking asylum. This is tied to a secret $500M+ deportation deal signed by Minister Burke

spencer (@techspence) 's Twitter Profile Photo

Today's syadmin ToDo: 1. launch cmd 2. enter: echo %path% 3. review permissions for any non-standard path If authenticated users has modify, rip it right out, don't even second guess it. If stuff breaks, fix it, don't cave and revert the permissions.

Today's syadmin ToDo:

1. launch cmd
2. enter: echo %path%
3. review permissions for any non-standard path

If authenticated users has modify, rip it right out, don't even second guess it.

If stuff breaks, fix it, don't cave and revert the permissions.
Autumn Christian (@teachrobotslove) 's Twitter Profile Photo

My husband is one of the most intelligent people I've ever met, and I was immediately taken by him, but over the years, I've come to learn most people can't see it. He dresses simply. He uses plain language. He likes superheroes and video games. They conclude they're not seeing a

spencer (@techspence) 's Twitter Profile Photo

When I was a sysadmin, these are the things I did, before I had security in my title, to get the experience I needed to make the switch. *GRC - Work on updating/creating policies and procedures - Learned about the business, risk, likelihood and impact - Learned how to translate

solst/ICE (@icesolst) 's Twitter Profile Photo

There’s a less known edge case for fortinet devices where, rather than act merely as a remote code execution platform, they can serve as firewalls

Chris Sanders 🔎 🧠 (@chrissanders88) 's Twitter Profile Photo

Why do investigative playbooks work? #SOC #DFIR 1. In any given investigation, analysts ask investigative questions that they answer with data (evidence) to determine what happened and if malicious activity occurred.

The Haag™ (@m_haggis) 's Twitter Profile Photo

🔥 CVE-2025-59287 | Splunk Security Content Drop 🔥 🚨 WSUS RCE goes deeper than expected! While digging into telemetry for CVE-2025-59287, we found a twist: 💥 Common chain → wsusservice.exe → cmd.exe or w3wp.exe → cmd.exe ⚙️ Alternate chain → mmc.exe → cmd.exe when an

INFOSEC F0X 🔥 (@infosec_fox) 's Twitter Profile Photo

IT people: “you need to block these AI browsers. They are a massive security problem!” Management: “but… AI!” IT: “AI sucks” Management: “use AI or else!” Gartner: “block all AI browsers immediately!” Management: “IT you must block all AI immediately!”

Barry Anderson (@z3ndrag0n) 's Twitter Profile Photo

whatever you do, don’t have your myki become faulty, because then you have two options: get to the Southern Cross hub (without using Public Transport presumably) or wait 10 business days (again, presumably without using Public Transport).

Black Hills Information Security (@bhinfosecurity) 's Twitter Profile Photo

2026 is here—time to refresh that toolkit! Atomic Red Team: Atomic Red Team Hands on Getting Started Guide - youtube.com/watch?v=O6w0oF… Why? Exactly are you not using Atomic Red Team? - youtube.com/watch?v=VTkRkg… DeepBlueCLI DeepBlueCLI - Tactical IR - youtube.com/watch?v=Gk9dRT…

2026 is here—time to refresh that toolkit!

Atomic Red Team:
Atomic Red Team Hands on Getting Started Guide - youtube.com/watch?v=O6w0oF…

Why? Exactly are you not using Atomic Red Team? - youtube.com/watch?v=VTkRkg…

DeepBlueCLI
DeepBlueCLI - Tactical IR - youtube.com/watch?v=Gk9dRT…
spencer (@techspence) 's Twitter Profile Photo

If you are an IT admin and you are in charge of managing Active Directory, take a look at this tool. I've been recommending it for a while now. Super great way to view delegations (and in my case find those that are insecure) The tool is called ADeleg btw. I wrote a wrapper