โš™ Rev - Cloud โ˜ Mechanic ๐Ÿ›  (@manuelberrueta) 's Twitter Profile
โš™ Rev - Cloud โ˜ Mechanic ๐Ÿ› 

@manuelberrueta

Offensive Security ๐Ÿ #RedTeam + #AppSec @ MSFT | ๐Ÿ‡บ๐Ÿ‡ธ๐Ÿ‡ฒ๐Ÿ‡ฝ | Husband&Father&Marine | My ramblings = my own ๐Ÿ˜ | Everything is a string! | #GoCougs

ID: 375716630

linkhttps://manuelberrueta.github.io/ calendar_today18-09-2011 16:26:50

2,2K Tweet

571 Followers

1,1K Following

GitHub Projects Community (@githubprojects) 's Twitter Profile Photo

|๏ฟฃ๏ฟฃ๏ฟฃ๏ฟฃ๏ฟฃ๏ฟฃ๏ฟฃ๏ฟฃ๏ฟฃ๏ฟฃ๏ฟฃ๏ฟฃ๏ฟฃ๏ฟฃ๏ฟฃ๏ฟฃ๏ฟฃ| | Don't Push To Production On Friday | |๏ผฟ๏ผฟ๏ผฟ๏ผฟ๏ผฟ๏ผฟ๏ผฟ๏ผฟ๏ผฟ๏ผฟ๏ผฟ๏ผฟ๏ผฟ๏ผฟ๏ผฟ๏ผฟ๏ผฟ| \ (โ€ขโ—กโ€ข) / \ / โ€”โ€” | | |_ |_

Nick Carr (@itsreallynick) 's Twitter Profile Photo

I'm told we are hiring in MSTIC: aka.ms/msticjobs Come for the data, stay for the data. Creative problem solvers have the most impact. If we've worked together, I'm happy to refer you. But...

โš™ Rev - Cloud โ˜ Mechanic ๐Ÿ›  (@manuelberrueta) 's Twitter Profile Photo

I just donated to support the Bischoff family after their heartbreaking loss. Every little bit helps during this tough time. Please consider sharing or donating if you can. Thank you. We miss you Zion ๐Ÿ™gofund.me/5c935853

Jack Rhysider ๐Ÿดโ€โ˜ ๏ธ (@jackrhysider) 's Twitter Profile Photo

The FBI wants you to use end to end encryption for your messages. This is surprising since the FBI has historically treated end to end encryption as if it's only for criminals. They want us to use it because Chinese hackers are in our telecom providers. Is E2EE enough though?

โš™ Rev - Cloud โ˜ Mechanic ๐Ÿ›  (@manuelberrueta) 's Twitter Profile Photo

Last of the year: - Exploring "Scripting in Bruno" for #API Hacking lnkd.in/gX9-s-3d - Unveiling the outcomes of the initial execution of Connect-MsGraphโ‰: lnkd.in/gp89aNKY Wishing yall a Merry Christmas ๐ŸŽ„๐ŸŽ…โ„, festive Holidays, and a prosperous New Year ๐ŸŽ†๐ŸŽ‡๐Ÿฅ‚๐Ÿป!

Microsoft BlueHat (@msftbluehat) 's Twitter Profile Photo

Learn how Microsoft scales Dynamic Application Security Testing (DAST) with automation. Check out Jason Geffner's blog post and BlueHat talk: โžก๏ธMSRC blog: msrc.microsoft.com/blog/2025/01/sโ€ฆ โžก๏ธBlueHat talk: youtube.com/watch?v=kfuOzDโ€ฆ

Microsoft Threat Intelligence (@msftsecintel) 's Twitter Profile Photo

Microsoft Threat Intelligence has observed North Korean state actor Emerald Sleet (also known as Kimsuky and VELVET CHOLLIMA) using a new tactic: tricking targets into running PowerShell as an administrator and then pasting and running code provided by the threat actor.

Microsoft Threat Intelligence has observed North Korean state actor Emerald Sleet (also known as Kimsuky and VELVET CHOLLIMA) using a new tactic: tricking targets into running PowerShell as an administrator and then pasting and running code provided by the threat actor.
โš™ Rev - Cloud โ˜ Mechanic ๐Ÿ›  (@manuelberrueta) 's Twitter Profile Photo

๐Ÿš€ Task Groups in Azure DevOps (ADO): From Automation to Exploitation๐Ÿ’ฅ I break down how misconfigurations can lead to code execution, persistence, and supply chain attacks, plus how to defend against them. manuelberrueta.github.io/supply_chain_sโ€ฆ #AzureDevOps #DevSecOps #RedTeam #pentesting

โš™ Rev - Cloud โ˜ Mechanic ๐Ÿ›  (@manuelberrueta) 's Twitter Profile Photo

Who has what access to what in Azure DevOps (ADO)? ๐Ÿค” Understanding Azure DevOps permissions is critical for security. ๐Ÿ” I walk through how to analyze permissions. manuelberrueta.github.io/supply_chain_sโ€ฆ #AzureDevOps #DevSecOps #RedTeam #Pentesting

Wiz (@wiz_io) 's Twitter Profile Photo

#IngressNightmare: Wiz Research uncovers a critical vulnerability in Ingress-NGINX ๐Ÿšจ Wiz Research found a novel attack vector in one of Kubernetes's most fundamental projects, Ingress-NGINX, which is rated CVSS 9.8.

#IngressNightmare: Wiz Research uncovers a critical vulnerability in Ingress-NGINX ๐Ÿšจ

Wiz Research found a novel attack vector in one of Kubernetes's most fundamental projects, Ingress-NGINX, which is rated CVSS 9.8.
Semgrep (@semgrep) 's Twitter Profile Photo

๐ŸŽ™๏ธ "I think of InfoSec roles these days as very similar to an artist, where you have to have a portfolio of workโ€”even if you havenโ€™t had a job yet." โ€” JS0N Haddix, Arcanum Information Security In this clip, Jason shares his top advice for breaking into security: ๐Ÿ”น Build a portfolio through

Pedro Ribeiro (@pedrib1337) 's Twitter Profile Photo

We are looking for a junior security researcher ๐Ÿค  No university degree or previous work experience required, but MUST be able to demonstrate interest in the field and some basic skills by either: 1. Have published blog post detailing 0-day vulnerability (found by yourself)

โš™ Rev - Cloud โ˜ Mechanic ๐Ÿ›  (@manuelberrueta) 's Twitter Profile Photo

Just dropped Hacking Buddy MCP ๐Ÿง ๐Ÿ’ฅ A proof-of-concept #MCP server exploring how #AI can help in offensive #security + ops. It's a PoC & light in tools, but built to share now, not wait for perfection. ๐Ÿ› ๏ธ Try it out: github.com/ManuelBerruetaโ€ฆ

โš™ Rev - Cloud โ˜ Mechanic ๐Ÿ›  (@manuelberrueta) 's Twitter Profile Photo

๐Ÿง  Another great post here! Being able to understand and deliver the story in a meaningful way is crucial. How you deliver it is quite importantโ€ฆdonโ€™t over look this!