Mike Burns (@mburns7) 's Twitter Profile
Mike Burns

@mburns7

Defend it and they will come. CISSP. CEH. @Mandiant Blueteam.

ID: 39317683

linkhttps://www.linkedin.com/in/mikeburns7/ calendar_today11-05-2009 19:14:41

517 Tweet

263 Followers

329 Following

Mike Burns (@mburns7) 's Twitter Profile Photo

How to null attributes in Microsoft Entra ID (Azure AD) Invoke-MgGraphRequest -Method PATCH -uri “graph.Microsoft.com/beta/users/$us…” -Body @{mobilePhone = $null} For the life of me, I can never remember this #azuread

Nathan McNulty (@nathanmcnulty) 's Twitter Profile Photo

In Entra ID, if we grant Mail.Read to an application, it can read ALL email in the organization by default The most common misconfigured apps I see are helpdesk, SIEM, and awareness training Limit scope using an Application Access Policy: learn.microsoft.com/en-us/graph/au…

Merill Fernando (@merill) 's Twitter Profile Photo

Here's a decision tree to help developers and admins who manage Microsoft 365, Azure and Entra tenants, pick the most secure authentication method for their apps. 🎯 Managed Identities The best option for app secrets is to not have any secrets in the first place. This way,

Here's a decision tree to help developers and admins who manage Microsoft 365, Azure and Entra tenants, pick the most secure authentication method for their apps.

🎯 Managed Identities

The best option for app secrets is to not have any secrets in the first place. This way,
Mike Burns (@mburns7) 's Twitter Profile Photo

Great, easy #logicapp to notify admins about expiring App Reg Secrets. Can't believe this isn't a built feature of Microsoft Entra ID (Azure AD) medium.com/@relente/how-t… ⬇️ app downtime related to expire keys ⬇️ attack surface by promoting frequently key rotations 😀 admins and security engineers

Mike Burns (@mburns7) 's Twitter Profile Photo

If want need guidance for building infrastructure from scratch on Google Cloud using HashiCorp #Terraform , I highly recommend giving this a read medium.com/@jojoooo/learn… ✅Quick and to the point ✅Easy to follow ✅Real-World examples

Meagan Longoria (@mmarie) 's Twitter Profile Photo

Azure friends, I just saw a function app deployed via the portal, purportedly with default settings. It has the function keys stored in a file in a storage account and the storage account key in plain text in a configuration setting. Is this really where we are in the year 2023?

Mike Burns (@mburns7) 's Twitter Profile Photo

If you read how start GCP from scratch using HashiCorp #Terraform - x.com/mburns7/status… This is a great follow-up on how to secure your #terraform config sysdig.com/blog/terraform… #DevOps These two blogs to go together like peanut butter and jelly

David Herrmann (@herrmanndigital) 's Twitter Profile Photo

Can I just say the Land Cruiser 70 Chinese edition is exactly what we need in the US? This has real buttons and MINIMALIST SCREENS ON THE DASH. I hate all the screens new vehicles have WITH NO REAL BUTTONS ANYMORE. So tempted to try and import one of these.

eammon (@theeammon) 's Twitter Profile Photo

Interviewer: "How well do you deal with things not going your way?" Me: "I have been a Buffalo Bills fan my entire life. And I am still alive, speaking to you right now."

Mandiant (part of Google Cloud) (@mandiant) 's Twitter Profile Photo

Learn about the updated version of the ConnectWise ScreenConnect product (23.9.8+) that mitigates vulnerabilities and read our remediation and hardening guide now to protect against threats. ⬇️ bit.ly/4bOrim7

Florian Roth ⚡️ (@cyb3rops) 's Twitter Profile Photo

Reading Microsoft’s new Void Blizzard report, one thing stands out (again): Everything is about credential theft, phishing, and tokens. Initial access comes from buying or stealing creds - often through low-effort phishing. All the real action happens in the cloud, not on

Reading Microsoft’s new Void Blizzard report, one thing stands out (again): Everything is about credential theft, phishing, and tokens. Initial access comes from buying or stealing creds - often through low-effort phishing. All the real action happens in the cloud, not on