nate (@nate2x4) 's Twitter Profile
nate

@nate2x4

Sysadmin turned CSIRT.

ID: 1905304646

calendar_today25-09-2013 20:18:29

689 Tweet

253 Followers

674 Following

nate (@nate2x4) 's Twitter Profile Photo

Reposting for anyone that needs to use the scale to help leadership understand the #SharePoint vulnerability severity.

nate (@nate2x4) 's Twitter Profile Photo

As expected, the Copilot version of chat sharing is also available for indexing on Google. Doesn't look like they were indexed very well, but they're all reachable. Have fun!

As expected, the Copilot version of chat sharing is also available for indexing on Google. Doesn't look like they were indexed very well, but they're all reachable. Have fun!
Who said what? (@g0njxa) 's Twitter Profile Photo

A Windows #Clickfix alternative seen in the wild on a mass-spreading malware campaign bypassing traditional Win+R shortcut restrictions User is asked to open the Windows Power User menu (Win+X), open a Powershell terminal and paste and running a malicious Clickfix-style command

A Windows #Clickfix alternative seen in the wild on a mass-spreading malware campaign bypassing traditional Win+R shortcut restrictions

User is asked to open the Windows Power User menu (Win+X), open a Powershell terminal and paste and running a malicious Clickfix-style command
nate (@nate2x4) 's Twitter Profile Photo

First Microsoft introduces the ability to disable direct send after all the abuse, and now Salesforce is providing a method to stop the abuse exploited by ShinyHunters. Better late than never!

First Microsoft introduces the ability to disable direct send after all the abuse, and now Salesforce is providing a method to stop the abuse exploited by ShinyHunters. Better late than never!
%TEMP% (@temp43487580) 's Twitter Profile Photo

I just started a new blog, and this is my first post. I took a bit of PTO, so this is a little record of some fun I had playing around with Intune during that time. It's about enrollment restriction bypassπŸ˜„ temp43487580.github.io/intune/bypass-…

Ismael Valenzuela (@aboutsecurity) 's Twitter Profile Photo

🚫 These threat actors tried to hide their code behind the GPU. We caught them anyways. 🐺 Our Arctic Wolf Labs team uncovered a threat actor abusing GitHub’s repository structure and Google Ads to redirect users to a malicious download, while a GPU-gated decryption routine kept

🚫 These threat actors tried to hide their code behind the GPU. We caught them anyways.

🐺 Our <a href="/AWNetworks/">Arctic Wolf</a> Labs team uncovered a threat actor abusing GitHub’s repository structure and Google Ads to redirect users to a malicious download, while a GPU-gated decryption routine kept
Invictus Incident Response (@invictusir) 's Twitter Profile Photo

One of the most insecure defaults is getting less insecure at the end of this month. Microsoft is limiting what permissions a user can consent to. This is very interesting for everyone doing #BEC investigations. Curious to see if this will impact malicious app usage. More info

One of the most insecure defaults is getting less insecure at the end of this month. Microsoft is limiting what permissions a user can consent to. This is very interesting for everyone doing #BEC investigations. Curious to see if this will impact malicious app usage.

More info