Ryan Terp (@ryan_terp) 's Twitter Profile
Ryan Terp

@ryan_terp

Information Security Engineer at Change Home Mortgage.

ID: 2812537796

linkhttps://www.linkedin.com/in/ryanterp calendar_today16-09-2014 06:08:39

5,5K Tweet

163 Followers

243 Following

Ryan Terp (@ryan_terp) 's Twitter Profile Photo

I just published a new PowerShell module IPInfoLite it (hopefully) makes access to the IP geolocation data via the IPInfo Lite API easier in PowerShell. Many thanks to the IPinfo – IP Data Provider team for providing this valuable API at no cost. powershellgallery.com/packages/IPInf…

Nicolas Krassas (@dinosn) 's Twitter Profile Photo

Experts found rogue devices, including hidden cellular radios, in Chinese-made power inverters used worldwide securityaffairs.com/178005/hacking…

LaurieWired (@lauriewired) 's Twitter Profile Photo

What if an OS fit entirely inside the CPU’s Cache? Turns out we’ve been doing it for decades. CNK, the OS for IBM’s Blue Gene Supercomputer, is just 5,000 lines of tight C++. Designed to “eliminate OS noise”, it lives in the cache after just a few milliseconds of boot.

What if an OS fit entirely inside the CPU’s Cache?
 
Turns out we’ve been doing it for decades.
 
CNK, the OS for IBM’s Blue Gene Supercomputer, is just 5,000 lines of tight C++. 

Designed to “eliminate OS noise”, it lives in the cache after just a few milliseconds of boot.
Florian Roth ⚡️ (@cyb3rops) 's Twitter Profile Photo

Windows SMB Client Elevation of Privilege Vulnerability CVSS Score: 8.8 Attack Vector: Network Attack Complexity: Low Privileges Required: Low User Interaction: None Do I have to say more? msrc.microsoft.com/update-guide/v…

Windows SMB Client Elevation of Privilege Vulnerability

CVSS Score: 8.8

Attack Vector: Network
Attack Complexity: Low
Privileges Required: Low
User Interaction: None

Do I have to say more? 

msrc.microsoft.com/update-guide/v…
✞ inversecos (@inversecos) 's Twitter Profile Photo

Red teamers, no need to “pull” clipboard data when Windows already saves it all on disk for you in a neat little file 🗿 (including past clipboard items) inversecos.com/2022/05/how-to…

Red teamers, no need to “pull” clipboard data when Windows already saves it all on disk for you in a neat little file 🗿

(including past clipboard items)

inversecos.com/2022/05/how-to…
The Hacker News (@thehackersnews) 's Twitter Profile Photo

🚨 NEW: CISA confirms ongoing attacks exploiting the SharePoint zero-day (CVE-2025-53770). ▶️ Unauthenticated attackers can run code over the network ▶️ At-risk orgs include U.S. critical infrastructure ▶️ CISA working with Microsoft to alert victims Urgent mitigation steps

🚨 NEW: CISA confirms ongoing attacks exploiting the SharePoint zero-day (CVE-2025-53770).

▶️ Unauthenticated attackers can run code over the network
▶️ At-risk orgs include U.S. critical infrastructure
▶️ CISA working with Microsoft to alert victims

Urgent mitigation steps
Nick Carr (@itsreallynick) 's Twitter Profile Photo

This mitigation is critical (esp based on Storm-2603 exploitation) and I expect it’s most-likely to be overlooked: 🔃🔑 Rotate SharePoint Server ASP .NET machine keys • After applying the latest security updates above or enabling AMSI, it is critical that customers rotate

Fabian Bader (@fabian_bader) 's Twitter Profile Photo

A rare, but highly welcome change. Microsoft changed the license requirement for Token protection from Entra ID P2 to P1. This will protect more customers in the long run and lead to a more secure ecosystem. learn.microsoft.com/en-us/entra/id…

A rare, but highly welcome change. Microsoft changed the license requirement for Token protection from Entra ID P2 to P1.

This will protect more customers in the long run and lead to a more secure ecosystem.

learn.microsoft.com/en-us/entra/id…
Squiblydoo (@squiblydooblog) 's Twitter Profile Photo

Most folk who follow me have seen me chat about Malcat. If you aren't familiar: It is a fairly inexpensive tool for malware analysis and RE that is super powerful. My favorite tool by far. The developer is doing a stream next week, something well worth catching.

Will (@bushidotoken) 's Twitter Profile Photo

Detections engineers, threat hunters, you should be putting controls in place for ‘Bring-Your-Own-EDR (BYOEDR)’ style attacks

ALI TAJRAN (@alitajran) 's Twitter Profile Photo

CRITICAL: Microsoft Releases Guidance on High-Severity Vulnerability (CVE-2025-53786) in Exchange Hybrid Deployments! The Cybersecurity and Infrastructure Security Agency (CISA) issues an Emergency Directive (ED 25-02), as exploitation could lead to complete identity takeover

CRITICAL: Microsoft Releases Guidance on High-Severity Vulnerability (CVE-2025-53786) in Exchange Hybrid Deployments!

The Cybersecurity and Infrastructure Security Agency (CISA) issues an Emergency Directive (ED 25-02), as exploitation could lead to complete identity takeover