Daniel Graciá (@danigraciaitpro) 's Twitter Profile
Daniel Graciá

@danigraciaitpro

IT Consultant Freelance,VCP6.7,MCSE Cloud,MCSA 2016,Nutanix NPP, ESAE, CompTIA Cloud+, Azure Architect, lector empedernido. Winter is coming.Fuerza y honor! :-)

ID: 866785759

linkhttp://blogs.itpro.es/danielgracia/ calendar_today07-10-2012 18:52:19

5,5K Tweet

521 Takipçi

1,1K Takip Edilen

Matt Zorich (@reprise_99) 's Twitter Profile Photo

Highly recommend everyone read the latest Microsoft Threat Intelligence blog, especially if you are involved in identity or cloud security. It details how threat actors can pivot between both your on-premises and cloud identity planes and cause destruction across both. Without proper guardrails

Highly recommend everyone read the latest <a href="/MsftSecIntel/">Microsoft Threat Intelligence</a> blog, especially if you are involved in identity or cloud security. It details how threat actors can pivot between both your on-premises and cloud identity planes and cause destruction across both.

Without proper guardrails
Ewelina Paczkowska (Welka's World) (@welkasworld) 's Twitter Profile Photo

🚨 New blog post on Conditional Access Essentials covering how to handle exclusions with TAP & Identity Governance ✅ Smooth onboarding ✅ Secure travel scenarios 🔗 welkasworld.com/post/condition… #Entra #ConditionalAccess #TAP #IdentityGovernance #AccessPackage

Khalil Afridi (@khalilapriday) 's Twitter Profile Photo

🚀 Free SOC Training from Microsoft! Kickstart your cybersecurity journey with a 3-hour SOC Foundations course. Perfect for students & early-career pros who want hands-on skills. 🔑 You’ll learn: ✅ SOC operations ✅ Incident response & threat detection ✅ Real-world

🚀 Free SOC Training from Microsoft! 

Kickstart your cybersecurity journey with a 3-hour SOC Foundations course.

 Perfect for students &amp; early-career pros who want hands-on skills.

🔑 You’ll learn:
✅ SOC operations
✅ Incident response &amp; threat detection
✅ Real-world
Sean Metcalf (@pyrotek3) 's Twitter Profile Photo

Since Kerberoast/Kerberoasting is in the news, here's the article on how to setup a Kerberoast honeypot to detect Kerberoasting activity: adsecurity.org/?p=3513 And this article describes some best practices for setting up an Active Directory honeypot account:

Guaje Salvaje (@guajesalvaje) 's Twitter Profile Photo

Perico Delgado: "A estos antisistema les da lo mismo lo que pase en Gaza. Quieren violencia, bronca. Les da igual quién salga malparado. Quieren lío aquí. Me parece fatal que algunos partidos apoyen esta manifestación violenta" Alguien lo tenía que decir.

Thorsten E. (@endi24) 's Twitter Profile Photo

Password Security, Part 2: The Human Factor – Password Patterns and Weaknesses Posted by: Parker Hunter guidepointsecurity.com/blog/password-…

Merill Fernando (@merill) 's Twitter Profile Photo

👋 Check out this new Microsoft Entra blog post 👇 Driving transparency: New logging capabilities and attribute enhancements in Microsoft Entra techcommunity.microsoft.com/t5/microsoft-e…

Guaje Salvaje (@guajesalvaje) 's Twitter Profile Photo

Sarah Santaolalla: "Solo por ver qué diría el PP si le dieran el Premio Nobel de la Paz a Pedro Sánchez, qué cara se les quedaría, ¡a favor! Y su sugar daddy Javier Ruiz le rie la 'gracia'. Vomitivo el nivel de propaganda y servilismo sanchista de RTVE.

Steven Lim (@0x534c) 's Twitter Profile Photo

“𝗠𝗶𝗰𝗿𝗼𝘀𝗼𝗳𝘁𝗦𝗲𝗿𝘃𝗶𝗰𝗲𝗣𝗿𝗶𝗻𝗰𝗶𝗽𝗮𝗹𝗦𝗶𝗴𝗻𝗜𝗻𝗟𝗼𝗴𝘀” stream now in Public Preview The MicrosoftServicePrincipalSignInLogs provides visibility into scenarios where Microsoft-owned (first-party) services authenticate to other Microsoft services within a tenant.

“𝗠𝗶𝗰𝗿𝗼𝘀𝗼𝗳𝘁𝗦𝗲𝗿𝘃𝗶𝗰𝗲𝗣𝗿𝗶𝗻𝗰𝗶𝗽𝗮𝗹𝗦𝗶𝗴𝗻𝗜𝗻𝗟𝗼𝗴𝘀” stream now in Public Preview

The MicrosoftServicePrincipalSignInLogs provides visibility into scenarios where Microsoft-owned (first-party) services authenticate to other Microsoft services within a tenant.
spencer (@techspence) 's Twitter Profile Photo

🎥 UPCOMING WEBINAR on the topic of Cybersecurity Budgeting for 2026... Presented by my boss, Brad Causey. What You’ll Learn: -The top security priorities for 2026 (identity, detection, cloud, and resilience) -How to map spend directly to risk reduction and measurable outcomes

Horizon Secured (@horizon_secured) 's Twitter Profile Photo

🔒 Secure Bits 💡 𝗘𝘃𝗲𝗿 𝗯𝗲𝗲𝗻 𝗺𝗶𝘀𝗹𝗲𝗱 𝗯𝘆 𝗪𝗶𝗻𝗱𝗼𝘄𝘀 𝗙𝗶𝗿𝗲𝘄𝗮𝗹𝗹 𝗰𝗺𝗱𝗹𝗲𝘁𝘀? This one’s a classic headache… and it can waste hours if you’re not careful. ⚠️ 𝗗𝗶𝗳𝗳𝗲𝗿𝗲𝗻𝘁 𝘁𝗼𝗼𝗹𝘀 = 𝗗𝗶𝗳𝗳𝗲𝗿𝗲𝗻𝘁 𝗿𝗲𝘀𝘂𝗹𝘁𝘀. Here’s what happens when you

🔒 Secure Bits 💡
𝗘𝘃𝗲𝗿 𝗯𝗲𝗲𝗻 𝗺𝗶𝘀𝗹𝗲𝗱 𝗯𝘆 𝗪𝗶𝗻𝗱𝗼𝘄𝘀 𝗙𝗶𝗿𝗲𝘄𝗮𝗹𝗹 𝗰𝗺𝗱𝗹𝗲𝘁𝘀?

This one’s a classic headache… and it can waste hours if you’re not careful.

⚠️ 𝗗𝗶𝗳𝗳𝗲𝗿𝗲𝗻𝘁 𝘁𝗼𝗼𝗹𝘀 = 𝗗𝗶𝗳𝗳𝗲𝗿𝗲𝗻𝘁 𝗿𝗲𝘀𝘂𝗹𝘁𝘀.
Here’s what happens when you