CloudKevin (@cloudkevin215) 's Twitter Profile
CloudKevin

@cloudkevin215

Dad. Security. Cyber. MSFT Security. Kayaker. Mountain Biker. Bike Packer. Outdoors. Weber Smoker. Ex-AWS. Ex-Bentley. Views- my own.

ID: 1596973564430893056

calendar_today27-11-2022 21:06:33

214 Tweet

196 Followers

1,1K Following

Microsoft Threat Intelligence (@msftsecintel) 's Twitter Profile Photo

Microsoft observed Iranian state-sponsored threat actor Peach Sandstorm deploying a new custom multi-stage backdoor named Tickler in attacks against multiple sectors in the United States and the United Arab Emirates. msft.it/6015lfpO5

Nıŋʝąƈąɬ 🐈 (@ravivtamir) 's Twitter Profile Photo

SOC teams handle on average 4,484 alerts per day! the unified Sentinel and Defender unified platform can reduce that load by up to 80% using our real time correlations, grouping together related alerts into ‘security incidents’. Read this blog to learn how techcommunity.microsoft.com/t5/microsoft-d…

Dave Kennedy (@hackingdave) 's Twitter Profile Photo

Cybersecurity automation with AI/LLMs is starting to become and will be one of the most desired skillsets in the next 3-5 years in all of security.

Microsoft Threat Intelligence (@msftsecintel) 's Twitter Profile Photo

Microsoft Threat Intelligence Center discovered an active and successful device code phishing campaign by a threat actor we track as Storm-2372. Storm-2372’s targets include governments, NGOs, IT services and technology, defense, telecoms, health, higher education, and energy/oil

BSidesCharm (@bsidescharm) 's Twitter Profile Photo

⏰ ⏰⏰⏰⏰⏰⏰⏰ OUR FIRST ROUND OF TICKET SALES IS LIVE! THIS IS NOT A DRILL!🪛 🪛 🪛 🪛 🪛 🪛 🪛 🪛 Here's a link to buy tickets: buff.ly/411ukyM

NSA/CSS (@nsagov) 's Twitter Profile Photo

NSA is aware of posts that appear to show inappropriate discussions by IC personnel. IC collaboration platforms are intended to drive mission outcomes. Potential misuse of these platforms by a small group of individuals does not represent the community. Investigations to address

vx-underground (@vxunderground) 's Twitter Profile Photo

Rant / opinion DdoS attacks can be difficult to attribute especially if it's DdoS-as-a-Service. Additionally, accurate attribution of any offensive cyber operation in mere hours in low. The likelihood of a state sponsored group performing a DdoS attack on an American social

FBI (@fbi) 's Twitter Profile Photo

Want to be a part of protecting U.S. critical infrastructure? InfraGard, a partnership program between the #FBI and members of the private sector, is now accepting applications for new members. InfraGard provides business leaders with the tools and network needed to better

Want to be a part of protecting U.S. critical infrastructure? InfraGard, a partnership program between the #FBI and members of the private sector, is now accepting applications for new members.

InfraGard provides business leaders with the tools and network needed to better