Tom E (@tde_sec) 's Twitter Profile
Tom E

@tde_sec

CTI @ JUMPSEC

ID: 1387485456409976836

calendar_today28-04-2021 19:15:51

842 Tweet

249 Followers

346 Following

SpecterOps (@specterops) 's Twitter Profile Photo

Introducing the BloodHound Query Library! 📚 Martin Sohn & Joey Dreijer explore the new collection of Cypher queries designed to help BloodHound users to unlock the full potential of the BloodHound platform by creating an open query ecosystem. ghst.ly/4jTgRQQ

C.J. May (@lawndoc) 's Twitter Profile Photo

New Defender detection "Suspicious Cloudflared Tunnel" 🔎 This detection will alert on Cloudflare tunnels that don't belong to your organization by parsing the --token parameter and checking it against your Cloudflare account ID. github.com/lawndoc/Advanc…

JUMPSEC (@jumpsec) 's Twitter Profile Photo

We're Hiring! Looking for an experienced Red Teamer. To plan and deliver intelligence-led operations against some of the most complex enterprise environments in the UK and beyond. Full info here ➡️jumpsec.com/position-red-c… #cybercareer #redteam JUMPSEC LABS

We're Hiring! Looking for an experienced Red Teamer.

To plan and deliver intelligence-led operations against some of the most complex enterprise environments in the UK and beyond.

Full info here ➡️jumpsec.com/position-red-c…

#cybercareer #redteam <a href="/JumpsecLabs/">JUMPSEC LABS</a>
Unit 42 (@unit42_intel) 's Twitter Profile Photo

On July 19, Microsoft issued guidance on CVE-2025-53770, a variant of CVE-2025-49706. At the time of posting, a patch is not available. Learn more about Microsoft’s customer guidance as the situation evolves: msrc.microsoft.com/blog/2025/07/c…

john fitzpatrick (@j0hn__f) 's Twitter Profile Photo

Technical deep dive into some current AiTM infrastructure using Azure Front Door and some other rather clever techniques. aitm-feed.com/blog/azure-fro… #AiTM

CISA Cyber (@cisacyber) 's Twitter Profile Photo

🕷️🚨 Scattered Spider threat actors are using social engineering techniques like phishing, push bombing & SIM swap attacks to target #CriticalInfrastructure orgs & commercial facilities. Check out our updated joint advisory for recommended mitigations. 👉go.dhs.gov/ioX

🕷️🚨 Scattered Spider threat actors are using social engineering techniques like phishing, push bombing &amp; SIM swap attacks to target #CriticalInfrastructure orgs &amp; commercial facilities. Check out our updated joint advisory for recommended mitigations. 👉go.dhs.gov/ioX
sapir federovsky (@sapirxfed) 's Twitter Profile Photo

WOW!!! temp43487580.github.io/intune/bypass-… %TEMP% such a good post!!! it is so well written, interesting research and great results! Thank you! 🤩

AiTM Feed (@aitm_feed) 's Twitter Profile Photo

The surge to 30,000 AiTM infrastructure detections on Wednesday this week was very much driven by pages[.]dev and workers[.]dev use. Rather than playing whack-a-mole we've been blocking those domains and so far have only blocked AiTM nothing legit!! YMMV #AiTM #Cloudflare

The surge to 30,000 AiTM infrastructure detections on Wednesday this week was very much driven by pages[.]dev and workers[.]dev use. Rather than playing whack-a-mole we've been blocking those domains and so far have only blocked AiTM nothing legit!! YMMV #AiTM #Cloudflare
AiTM Feed (@aitm_feed) 's Twitter Profile Photo

If you want to block ShadowCaptcha campaigns blocking these three domains will help: - cloudshielders[.]com - analytiwave[.]com - analyticanoden[.]com There is heavy geo/user-agent/os detection going on, so you may not see click-fix but your users might #clickFix #shadowCaptcha

Mandiant (part of Google Cloud) (@mandiant) 's Twitter Profile Photo

🚨 We identified a ViewState deserialization attack affecting Sitecore deployments. The attacker leveraged an exposed ASP[.]NET machine key to perform remote code execution. Get the full details, indicators of compromise, and defensive recommendations: goo.gle/47oNWll

🚨 We identified a ViewState deserialization attack affecting Sitecore deployments. The attacker leveraged an exposed ASP[.]NET machine key to perform remote code execution.

Get the full details, indicators of compromise, and defensive recommendations: goo.gle/47oNWll
ANY.RUN (@anyrun_app) 's Twitter Profile Photo

🚨 #Salty2FA is a new #phishkit linked to #Storm1575. Active since June, it bypasses 2FA to gain access beyond stolen creds. Using a unique domain pattern and multi-stage chain, it targets finance, energy, telecom and more. Read analysis: any.run/cybersecurity-…

🚨 #Salty2FA is a new #phishkit linked to #Storm1575. 
Active since June, it bypasses 2FA to gain access beyond stolen creds. Using a unique domain pattern and multi-stage chain, it targets finance, energy, telecom and more.

Read analysis: any.run/cybersecurity-…
Dirk-jan (@_dirkjan) 's Twitter Profile Photo

I've been researching the Microsoft cloud for almost 7 years now. A few months ago that research resulted in the most impactful vulnerability I will probably ever find: a token validation flaw allowing me to get Global Admin in any Entra ID tenant. Blog: dirkjanm.io/obtaining-glob…

SpecterOps (@specterops) 's Twitter Profile Photo

Lateral movement getting blocked by traditional methods? werdhaihai just dropped research on a new lateral movement technique using Windows Installer Custom Action Server, complete with working BOF code. ghst.ly/4pN03PG

BleepingComputer (@bleepincomputer) 's Twitter Profile Photo

Emails claim Oracle data theft in new Clop-linked extortion campaign - Lawrence Abrams bleepingcomputer.com/news/security/… bleepingcomputer.com/news/security/…

Stephen Fewer (@stephenfewer) 's Twitter Profile Photo

We just posted our AttackerKB Rapid7 Analysis for the recent Cisco ASA 0day chain; CVE-2025-20362 and CVE-2025-20333. The auth bypass appears to be a patch bypass of an older 2018 vuln. The buffer overflow is in a Lua endpoint, but unsafe native code operations allow a buffer to

Trend Zero Day Initiative (@thezdi) 's Twitter Profile Photo

It's confirmed! Ken Gannon / 伊藤 剣 (@yogehi) of Mobile Hacking Lab, and Dimitrios Valsamaras (Dimitri Os) of Summoning Team (SummoningTeam) used five different bugs to exploit the #Samsung Galaxy S25. They earn $50,000 and 5 Master of Pwn points. #Pwn2Own

It's confirmed! Ken Gannon / 伊藤 剣 (@yogehi) of Mobile Hacking Lab, and Dimitrios Valsamaras (<a href="/Ch0pin/">Dimitri Os</a>) of Summoning Team (<a href="/SummoningTeam/">SummoningTeam</a>) used five different bugs to exploit the #Samsung Galaxy S25. They earn $50,000 and 5 Master of Pwn points. #Pwn2Own