ZeroDayPlus (@zerodayplus) 's Twitter Profile
ZeroDayPlus

@zerodayplus

Cybersecurity & Cricket

ID: 1722615939362164736

calendar_today09-11-2023 14:03:46

218 Tweet

39 Followers

494 Following

Ptrace Security GmbH (@ptracesecurity) 's Twitter Profile Photo

OSINT tool for searching people's digital footprint and leaked passwords across various social networks, written in Go. github.com/ibnaleem/gosea… #pentesting #CyberSecurity #infosec

OSINT tool for searching people's digital footprint and leaked passwords across various social networks, written in Go. github.com/ibnaleem/gosea… #pentesting #CyberSecurity #infosec
Murray (@mynameismurray) 's Twitter Profile Photo

A couple of weird Azure Arc things: 1. The new licensing requirement for Windows Admin Center (still in preview) is quite confusing. It states that all my servers have no license type configured. The same account and subscription has VL data available, saying I do have SA.

A couple of weird Azure Arc things:

1. The new licensing requirement for Windows Admin Center (still in preview) is quite confusing. It states that all my servers have no license type configured. The same account and subscription has VL data available, saying I do have SA.
Skai. (@supersaiyanskai) 's Twitter Profile Photo

Yo, I don't post about cyber security but I have to share this gem I stumbled on last week. Seriously it's hands down the most valuable resource I have ever found for anyone diving into or curious about cyber security, plus it's free, the Internet is amazing 😭❀️

Yo, I don't post about cyber security but I have to share this gem I stumbled on last week. 
Seriously it's hands down the most valuable resource I have ever found for anyone diving into or curious about cyber security, plus it's free, the Internet is amazing 😭❀️
Digitalearn (@digitalearn_1) 's Twitter Profile Photo

Linux: Zero to Hundred πŸ’― Start Today: youtube.com/@digitalearn_o… Never regret ⚑ π˜½π™€π™€π™  1:1 π™˜π™–π™‘π™‘ π™¬π™žπ™©π™ 𝙀π™ͺ𝙧 𝙀𝙭π™₯π™šπ™§π™©π™¨: docs.google.com/forms/d/e/1FAI…

Linux: Zero to Hundred πŸ’―

Start Today: youtube.com/@digitalearn_o… 

Never regret ⚑

π˜½π™€π™€π™  1:1 π™˜π™–π™‘π™‘ π™¬π™žπ™©π™ 𝙀π™ͺ𝙧 𝙀𝙭π™₯π™šπ™§π™©π™¨: docs.google.com/forms/d/e/1FAI…
Nathan McNulty (@nathanmcnulty) 's Twitter Profile Photo

If you are responsible for Entra security (auth methods, CA policies, etc.), you will definitely benefit from watching Microsoft's Identity Platform videos: learn.microsoft.com/en-us/entra/id… Yes these are targeted at developers, but there's still a lot we can learn and apply from these :)

Microsoft Security (@msftsecurity) 's Twitter Profile Photo

Sick of password resets and security risks? Meet passkeysβ€”a faster, safer sign-in method with multi-factor authentication, phishing resistance, and data breach protection. msft.it/6019Sroox

DirectoryRanger (@directoryranger) 's Twitter Profile Photo

Active Directory Hardening Series Part 1 Disabling NTLMv1 techcommunity.microsoft.com/blog/coreinfra… Part 2 Removing SMBv1 techcommunity.microsoft.com/blog/coreinfra… Part 3 Enforcing LDAP Signing techcommunity.microsoft.com/blog/coreinfra… Part 4 Enforcing AES for Kerberos techcommunity.microsoft.com/blog/coreinfra…

Security Trybe (@securitytrybe) 's Twitter Profile Photo

Are you interested in Cloud Security ? Here are some FREE Cloud Security Courses/Certifications AWS Security Fundamentals. Link- lnkd.in/day6K9XG Become a Cloud Security Professional- Oracle Link- lnkd.in/dZXfbqxA Cloud Computing Security - CISA Link-

David O'Brien (he/him) (@david_obrien) 's Twitter Profile Photo

Microsoft Well-Architected Reviews. Looking beyond "just security" a lot of orgs want to know how well they're "doing cloud" generally. We already cover the Azure Security pillar with a great customer-ready report in minutes & over 200 controls. Curious? argos-security.io

Microsoft Well-Architected Reviews. Looking beyond "just security" a lot of orgs want to know how well they're "doing cloud" generally.
We already cover the Azure Security pillar with a great customer-ready report in minutes & over 200 controls.
Curious? argos-security.io
Elli Shlomo (IR) (@ellishlomo) 's Twitter Profile Photo

Microsoft Teams isn’t just a chat app anymore, it's more than that. In my last security testing/pt, I was able to infiltrate/break and get into the most sensitive information and take over a privileged user. The good news is that you've included the relevant logs and security

Microsoft Teams isn’t just a chat app anymore, it's more than that.  In my last security testing/pt, I was able to infiltrate/break and get into the most sensitive information and take over a privileged user.  The good news is that you've included the relevant logs and security
Black Hat (@blackhatevents) 's Twitter Profile Photo

Don't miss #BHUSA Briefings "Advanced Active Directory to Entra ID Lateral Movement Techniques". Introducing several new lateral movement techniques that allow us to bypass authentication, MFA, stealthily exfiltrate data & more >> bit.ly/3TIyGHH

Oddvar Moe (@oddvarmoe) 's Twitter Profile Photo

🚨 Heads-up for #AppLocker admins on #Lenovo laptops. ICYMI There's a sneaky leftover file inside C:\Windows\ that can be used to bypass your AppLocker restrictions. 😱 It’s part of Lenovo’s OEM setup. Worth checking for and removing if you rely on AppLocker. πŸ” Info about the

Matt Hand (@matterpreter) 's Twitter Profile Photo

Two years ago, I left red teaming for a new challenge in endpoint security. I'm humbled by the incredible team we've built and so proud to share this research preview of our work. It’s an idea I believe in deeply, and I can’t wait for what’s ahead. πŸ–€

Ru Campbell (@rucam365) 's Twitter Profile Photo

New video: 1hr of advanced Conditional Access deep dives with Nate Hutchinson at Threatscape. Covering nuanced scenarios like app allow listing, missing app management, and really stretching CA into some cool and uncommon uses. WATCH: youtu.be/DkCq8wWN9Sc

New video: 1hr of advanced Conditional Access deep dives with <a href="/NateHutch365/">Nate Hutchinson</a> at <a href="/Threatscape/">Threatscape</a>.

Covering nuanced scenarios like app allow listing, missing app management, and really stretching CA into some cool and uncommon uses.

WATCH: youtu.be/DkCq8wWN9Sc
Microsoft Threat Intelligence (@msftsecintel) 's Twitter Profile Photo

Project Ire, an autonomous AI agent, automates what’s considered the gold standard in malware classification: fully reverse engineering a software file without any clues about its origin or purpose: msft.it/6017sMSiW To identify malware at scale, Project Ire uses