CyberBob (@dylanowendylan) 's Twitter Profile
CyberBob

@dylanowendylan

CISO. Nightwing.us Delivering Managed Detection and Response (MDR) Services, threat hunting, pen testing etc... Views/opinions are my own!

ID: 901916311

calendar_today24-10-2012 14:15:37

27,27K Tweet

762 Takipçi

1,1K Takip Edilen

hi^^ (@collysucker) 's Twitter Profile Photo

Microsoft openly admitting they have not(!) had MFA, network segmentation, least privilege, software lifecycle, jump-servers, asset- and software-inventory etc for Azure PROD for years and they are not there yet. This whole report is just so scary. At the same time, good.. (1/2)

Microsoft openly admitting they have not(!) had MFA, network segmentation, least privilege, software lifecycle, jump-servers, asset- and software-inventory etc for Azure PROD for years and they are not there yet.

This whole report is just so scary. At the same time, good.. (1/2)
mRr3b00t (@uk_daniel_card) 's Twitter Profile Photo

I want to talk about how when you use a VPN there's a few things to think about: 1) your ISP will have logs (netflow/dns) of your connecting to the VPN 2) the routers in the path may also log this 3) the ISP of the VPN provider will log these 4) the VPN provider may say no logs

I want to talk about how when you use a VPN there's a few things to think about:

1) your ISP will have logs (netflow/dns) of your connecting to the VPN
2) the routers in the path may also log this
3) the ISP of the VPN provider will log these
4) the VPN provider may say no logs
Rudy Ooms | MVP 🇳🇱 (@mister_mdm) 's Twitter Profile Photo

Wondering why Intune Remote Actions are Fast at First but Slow the Next Day? On the first day, when a device is enrolled, Intune remote actions feel almost instant! Pull the diagnostics logs or perform a remote sync, and the device checks in right away. Even EPM support approval

Wondering why Intune Remote Actions are Fast at First but Slow the Next Day?

On the first day, when a device is enrolled, Intune remote actions feel almost instant! Pull the diagnostics logs or perform a remote sync, and the device checks in right away. Even EPM support approval
vx-underground (@vxunderground) 's Twitter Profile Photo

Someone brought it to my attention that Zscaler is using their 500,000,000,000 daily customer logs to train Artificial Intelligence. ... does this not seem like a problem ... ?

Someone brought it to my attention that Zscaler is using their 500,000,000,000 daily customer logs to train Artificial Intelligence.

... does this not seem like a problem ... ?
CyberBob (@dylanowendylan) 's Twitter Profile Photo

This is pretty massive. It's been pretty standard advice to tell people to use a password manager and now they are all vulnerable to the same attack scenario. Good on those that have fixed this. For the rest get it done!! …ersecuritynews-com.cdn.ampproject.org/c/s/cybersecur…

All The Right Movies (@atrightmovies) 's Twitter Profile Photo

AN AMERICAN WEREWOLF IN LONDON was released 44 years ago this week. One of the most popular horror-comedies out there, and with groundbreaking effects work, the behind the scenes story will make you beware the moon… 1/39

AN AMERICAN WEREWOLF IN LONDON was released 44 years ago this week. One of the most popular horror-comedies out there, and with groundbreaking effects work, the behind the scenes story will make you beware the moon…

1/39
nyxgeek (@nyxgeek) 's Twitter Profile Photo

If you do cloud, or any pentesting these days really, you should be familiar with JWTs. Found this neat writeup with some attack vectors against the parsing of the JWTs. All you need to know about JWT Pt. 2 cobalt.io/blog/all-you-n…

Joe Stocker (@itguysocal) 's Twitter Profile Photo

NEW Microsoft Entra SSE feature in public preview: "IT Admins can now set detailed SPN-level policies, such as requiring MFA for cifs/* file shares, enabling compliant device access to MSSQL/* servers, and applying step-up authentication for sensitive RDP servers. This allows

NEW Microsoft Entra SSE feature in public preview: 
"IT Admins can now set detailed SPN-level policies, such as requiring MFA for cifs/* file shares, enabling compliant device access to MSSQL/* servers, and applying step-up authentication for sensitive RDP servers. This allows
Robert Graham (@erratarob) 's Twitter Profile Photo

Tina Peters is a county election worker from Colorado who violated her oath and committed crimes because she believed Trump's conspiracy theories. She found no "cheating". All her illegal actions to "expose" something simply revealed what was already publicly known, how

Tina Peters is a county election worker from Colorado who violated her oath and committed crimes because she believed Trump's conspiracy theories. She found no "cheating".

All her illegal actions to "expose" something simply revealed what was already publicly known, how
spencer (@techspence) 's Twitter Profile Photo

Let’s make Active Directory security education available to all! List your favorite Active Directory security resources. Plz share for reach!

Fabian Bader (@fabian_bader) 's Twitter Profile Photo

Token Protection in Microsoft Entra Conditional Access for Windows is now GA! 🎉 #EntraID #Token learn.microsoft.com/en-us/entra/id…

Token Protection in Microsoft Entra Conditional Access for Windows is now GA! 🎉

#EntraID #Token

learn.microsoft.com/en-us/entra/id…
Fabrizio Romano (@fabrizioromano) 's Twitter Profile Photo

⚪️⚫️🇺🇸 Borussia Mönchengladbach win race over Parma to sign Gio Reyna from Borussia Dortmund. Agreement in place with Reyna and his agency Roof to get the green light for medical.

⚪️⚫️🇺🇸 Borussia Mönchengladbach win race over Parma to sign Gio Reyna from Borussia Dortmund.

Agreement in place with Reyna and his agency Roof to get the green light for medical.