neonprimetime (@neonprimetime) 's Twitter Profile
neonprimetime

@neonprimetime

detection engineering, malware analysis, IR, threat hunting #DailyThreatHunt, threat intel, blue team, Qradar, Author of now archived @PhishKitTracker project

ID: 48459503

linkhttp://neonprimetime.blogspot.com calendar_today18-06-2009 19:29:24

10,10K Tweet

3,3K Followers

315 Following

Squiblydoo (@squiblydooblog) 's Twitter Profile Photo

I see PDFSkills has a new code-signing certificate "BLACK INDIGO LTD". #EV #ImpostorCert #Reported Please don't let your employees use "Free" PDF editing tools. virustotal.com/gui/file/1c359…

I see PDFSkills has a new code-signing certificate "BLACK INDIGO LTD". 
#EV #ImpostorCert #Reported

Please don't let your employees use "Free" PDF editing tools.

virustotal.com/gui/file/1c359…
Nathan McNulty (@nathanmcnulty) 's Twitter Profile Photo

This is a fun one :) Let's say you have a Conditional Access policy requiring MFA for All resources, and then you exclude one resource Did you know that also automatically adds additional exlusions for some low privileged scopes depending on client app? learn.microsoft.com/en-us/entra/id…

This is a fun one :)

Let's say you have a Conditional Access policy requiring MFA for All resources, and then you exclude one resource

Did you know that also automatically adds additional exlusions for some low privileged scopes depending on client app?

learn.microsoft.com/en-us/entra/id…
Florian Roth ⚡️ (@cyb3rops) 's Twitter Profile Photo

Welcome to the era of the token. In the past, attackers had to breach networks, bypass security controls, escalate privileges, and evade detection just to reach confidential data. Now? A single OAuth authorization - granted with one click - can hand over access to emails, files,

IAM!ERICA (@ericazelic) 's Twitter Profile Photo

MartijnFSnl Nathan McNulty This is why the lead designer of conditional access from Microsoft put out a video a couple years ago explaining why you need to include all resources (all cloud apps at the time) when targeting resources for conditional access. Otherwise, in most cases, you open up gaps in

Nathan McNulty (@nathanmcnulty) 's Twitter Profile Photo

A very common mistake I see for those newer to Azure and Arc is not understanding the risk associated with permissions in Azure and privilege escalation paths to Arc enabled servers It's a good idea to consider locking down Arc to only what you need ;) learn.microsoft.com/en-us/azure/az…

A very common mistake I see for those newer to Azure and Arc is not understanding the risk associated with permissions in Azure and privilege escalation paths to Arc enabled servers

It's a good idea to consider locking down Arc to only what you need ;)

learn.microsoft.com/en-us/azure/az…
neonprimetime (@neonprimetime) 's Twitter Profile Photo

“…Van Andel’s digital unraveling began …when he downloaded free software from …GitHub while trying out some new artificial intelligence technology … the AI assistant was actually malware that gave the hacker behind it access to his computer, and his entire digital life…”

neonprimetime (@neonprimetime) 's Twitter Profile Photo

“…threat actors dropped… ransomware payload …but the victim's EDR … quarantined it … threat actors utilized the webcam's Linux operating system to mount Windows SMB network shares … used it to encrypt the network shares over SMB, effectively circumventing the EDR …” #akira

Huntress (@huntresslabs) 's Twitter Profile Photo

A threat actor slid into a network through exposed virtual network computing (VNC). Here’s what happened 👇 ✅ They deployed C:\\Users\\<redacted>\\Music\\setup.msi to install Atera & Splashtop for persistent remote access

ZOYA ✪ (@zoya_ai) 's Twitter Profile Photo

Microsoft is Offering FREE Azure 2025 Certification Courses! No Fee, Completely Free These 20 Courses Includes Video Tutorials, Hand's on Labs and Notes. Don't miss these courses if you want to make your career in 2025:

Microsoft is Offering FREE Azure 2025 Certification Courses!

No Fee, Completely Free

These 20 Courses Includes Video Tutorials, Hand's on Labs and Notes.

Don't miss these courses if you want to make your career in 2025:
spencer (@techspence) 's Twitter Profile Photo

There's no reason to NOT strictly control RMM installation and usage in your environment. There are currently 272 RMMs in the LoLRMM project right now. Most orgs probably use 1 or 2, legitimately. lolrmm.io

DarkFeed (@ido_cohen2) 's Twitter Profile Photo

🚨 Ransomware Alert: Medusa Hits NASCAR The ransomware group Medusa has listed the National Association for Stock Car Auto Racing (NASCAR) as a victim on its leak site. 📂 The threat actors claim to have exfiltrated 1,038.70 GB of sensitive data and are demanding $4 million to

🚨 Ransomware Alert: Medusa Hits NASCAR

The ransomware group Medusa has listed the National Association for Stock Car Auto Racing (NASCAR) as a victim on its leak site.

📂 The threat actors claim to have exfiltrated 1,038.70 GB of sensitive data and are demanding $4 million to
notEricaZelic (@iamericabooted) 's Twitter Profile Photo

You can set up conditional access for your workload identities. For 3rd party SaaS apps with high risk permissions, this is a good idea.

BleepingComputer (@bleepincomputer) 's Twitter Profile Photo

MATLAB dev confirms ransomware attack behind service outage - Sergiu Gatlan bleepingcomputer.com/news/security/… bleepingcomputer.com/news/security/…