GRInfosec (@grinfosecurity) 's Twitter Profile
GRInfosec

@grinfosecurity

šŸ“ó §ó ¢ó ·ó ¬ó ³ó æ Cymro. Information security practitioner, cyber defence lead. Outdoor enthusiast. Supporter @SecurityBsides.

ID: 2448170923

calendar_today16-04-2014 22:26:30

208 Tweet

188 Followers

2,2K Following

Merill Fernando (@merill) 's Twitter Profile Photo

Need to find out who has highly privileged OAuth API access to your Microsoft 365 tenant? I just published a new cmdlet that will generate a detailed report down to individual permission scopes. All the details in this YouTube video youtube.com/watch?v=vO0m5y…

BSides Cymru (@bsidescymru) 's Twitter Profile Photo

Oof, someone was quick. Our first ticket has been sold and we've only just released the first drop. Wait.... Read that again.... we've just released the first ticket drop šŸ˜€šŸ˜€šŸ˜€ Hurry!!!! eventbrite.co.uk/e/bsides-cymru… #bsides #infosec #bsidescymru

Merill Fernando (@merill) 's Twitter Profile Photo

The ability to block Device Code Flow just became available in Microsoft Entra ID Conditional Access. Here's a quick walkthrough of how attackers use device code flow to get access to your tenant and what you can do to protect yourself.

The ability to block Device Code Flow just became available in Microsoft Entra ID Conditional Access.

Here's a quick walkthrough of how attackers use device code flow to get access to your tenant and what you can do to protect yourself.
GRInfosec (@grinfosecurity) 's Twitter Profile Photo

Native FIDO2 support for strong authn without ADCS Reference architectures for deploying hardened domain services (hybrid) Built in lockdown mode with hardening policy and WDAC Turnkey PIM and secure admin solution (Arc?)

BSides London (@bsideslondon) 's Twitter Profile Photo

The final #BSidesLDN2024 ticket release is tomorrow! eventbrite.co.uk/e/bsides-londo… If you get (or currently have) a ticket and find you can no longer be there on the day, please cancel or transfer your ticket so someone else can! #Security #BSides #London #BSidesCyBear #Tickets

The final #BSidesLDN2024 ticket release is tomorrow!

eventbrite.co.uk/e/bsides-londo…
If you get (or currently have) a ticket and find you can no longer be there on the day, please cancel or transfer your ticket so someone else can!

#Security #BSides #London #BSidesCyBear #Tickets
spencer (@techspence) 's Twitter Profile Photo

We all know it’s not a great idea to log into end-user systems with Domain Admin creds, but it still happens. A lot. And every time I see it, it makes me šŸ˜” — here’s why: 🧵A short (probably relatable) thread of how it can go sideways..

We all know it’s not a great idea to log into end-user systems with Domain Admin creds, but it still happens. A lot.

And every time I see it, it makes me šŸ˜” — here’s why:

🧵A short (probably relatable) thread of how it can go sideways..
BSides Cheltenham (@bsideschelt) 's Twitter Profile Photo

There’s TEN days until our early bird tickets! Our Early Bird tickets are Ā£15 and you’ll be helping to support us and the local cyber community - plus you get your own limited edition challenge coin šŸ‘€ Set your alarm for 11am on 18/04! See you there!

There’s TEN days until our early bird tickets!

Our Early Bird tickets are Ā£15 and you’ll be helping to support us and the local cyber community - plus you get your own limited edition challenge coin šŸ‘€

Set your alarm for 11am on 18/04! See you there!
Ru Campbell (@rucam365) 's Twitter Profile Photo

Folks, hope you can join us on Wednesday for this month's user group - these speakers are absolute experts in what they do and you will learn a ton. It's not recorded, so join us live or miss out. REGISTER: meetup.com/m365sandcug/ev…

Folks, hope you can join us on Wednesday for this month's user group - these speakers are absolute experts in what they do and you will learn a ton.

It's not recorded, so join us live or miss out.

REGISTER: meetup.com/m365sandcug/ev…
BSides London (@bsideslondon) 's Twitter Profile Photo

Croeso BSides Aberystwyth, bydded i ni fod y cyntaf i'ch croesawu a phob lwc ym mis Tachwedd! bsidesaberystwyth.org #Security #BSides #Aberystwyth #BSidesAberystwyth

notEricaZelic (@iamericabooted) 's Twitter Profile Photo

Cloud security in a nutshell: goal is to decrease risk. In cloud it goes a bit like this: IAM - MFA all the things. If you can swing it with ops, pilot passwordless. Users will love it, I promise! Make sure everyone can't just escalate privileges when they're not admins Make

Thinkst Canary (@thinkstcanary) 's Twitter Profile Photo

Today we released our new (free) AWS Infrastructure Canarytoken. It catches attackers in your AWS account by putting tempting assets in their way and alerting you if they get probed. Extending our old work on fake AWS assets, this makes it even easier to deploy juicy S3

Merill Fernando (@merill) 's Twitter Profile Photo

Folks, I'm super excited to announce a three part webinar series from Microsoft that involves some of your favorite folks from the Entra community. Nathan McNulty and Ru Campbell will be joining me and others from Microsoft to talk about implementing Zero Trust for identity and

Folks, I'm super excited to announce a three part webinar series from Microsoft that involves some of your favorite folks from the Entra community.

<a href="/NathanMcNulty/">Nathan McNulty</a>  and <a href="/rucam365/">Ru Campbell</a> will be joining me and others from Microsoft to talk about implementing Zero Trust for identity and
mRr3b00t (@uk_daniel_card) 's Twitter Profile Photo

Key things seen in ransomware incidents: 1) VPN does not require MFA 2) Standard User VPN access gives access to management interfaces 3) LDAP access leads to domain admin via: Passwords in description fields, kerberoasting and other common escalation points (but seriously the

Ru Campbell (@rucam365) 's Twitter Profile Photo

New post: focusing on the key biggest Microsoft 365 security considerations. READ: campbell.scot/microsoft-365-… When we talk about Microsoft 365 security, we are talking about two things: (a) securing Microsoft 365 the platform, (b) using Microsoft 365 security tooling.

Fabian Bader (@fabian_bader) 's Twitter Profile Photo

I finally came around and documented all the Conditional Access bypasses in a single blog post. It contains not only the documented bypasses, but also the results of new research. #Entra #ConditionalAccess #Security #Cheese cloudbrothers.info/en/conditional…

Matt Zorich (@reprise_99) 's Twitter Profile Photo

We spend a lot of time talking about OAuth phishing, token theft from malware, adversary in the middle phishing and other novel attacks, and rightly so, but it is important to remember that MFA is still an extremely valuable control. Modern MFA reduces the risk of identity

We spend a lot of time talking about OAuth phishing, token theft from malware, adversary in the middle phishing and other novel attacks, and rightly so, but it is important to remember that MFA is still an extremely valuable control. 

Modern MFA reduces the risk of identity