Zach Moore (@zm_infosec) 's Twitter Profile
Zach Moore

@zm_infosec

ID: 1153836065226141697

calendar_today24-07-2019 01:15:29

52 Tweet

96 Takipçi

219 Takip Edilen

Zach Moore (@zm_infosec) 's Twitter Profile Photo

Have you just rolled out Defender for Endpoint and are wondering where to start configuring? In this video, I review how to configure the Automated Investigation feature of MDE. #defender #msftadvocate #mde youtu.be/1UJoH-p3Xik

Zach Moore (@zm_infosec) 's Twitter Profile Photo

Curious about Defender for Endpoint's Threat and Vulnerability Management capabilities? In this video, I dive into the TVM feature set. #msftadvocate #mde #tvm #defenderforendpoint youtu.be/0KY19q5ZgQ0

Zach Moore (@zm_infosec) 's Twitter Profile Photo

Want to know more about MDE Advanced Features? In this video, I do a deep dive on what these features are and how they can help further secure your endpoints. #msftadvocate #mde #microsoftsecurity youtu.be/zigu9YbpsFE

Ru Campbell (@rucam365) 's Twitter Profile Photo

Just released my latest analysis of Defender for Endpoint features by OS. Targeted at folks deploying MDE to understand what can be used and where; what capabilities you might have missed; or potential customers evaluating options. Blog + download: campbell.scot/mde-comparison…

Just released my latest analysis of Defender for Endpoint features by OS.  

Targeted at folks deploying MDE to understand what can be used and where; what capabilities you might have missed; or potential customers evaluating options. 

Blog + download: campbell.scot/mde-comparison…
Speaker 25 (@rodtrent) 's Twitter Profile Photo

Protect your organizations against QR code phishing with Defender for Office 365 techcommunity.microsoft.com/t5/microsoft-d… #MicrosoftDefender #Security #MicrosoftSecurity #Cybersecurity #DefenderXDR

Florian Roth ⚡️ (@cyb3rops) 's Twitter Profile Photo

Just to be clear : this rule is for hunting purposes only. This doesn’t imply that the rule causes many false positives - on the contrary. We haven’t yet seen files signed with this certificate on VirusTotal. We expect developments regarding AnyDesk's current situation to

Joe Stocker (@itguysocal) 's Twitter Profile Photo

Dear Microsoft Teams, Enterprise Customers (the ones who pay the bill for Teams) do not want to see advertisements inside Teams to promote the use of personal accounts: 1) Exfiltration of Company Data 2) Teams Phishing. Links clicked in Personal Chat put the corporate PC and

Dear <a href="/MicrosoftTeams/">Microsoft Teams</a>, 

Enterprise Customers (the ones who pay the bill for Teams) do not want to see advertisements inside Teams to promote the use of personal accounts:

1) Exfiltration of Company Data

2) Teams Phishing. Links clicked in Personal Chat put the corporate PC and
Microsoft Mechanics (@msftmechanics) 's Twitter Profile Photo

Detect and shut down token attacks as they happen. Check out token protection enforcement in Microsoft Entra. #TokenProtection youtu.be/gPcNlm0CyOw

Joe Stocker (@itguysocal) 's Twitter Profile Photo

New Government Power Unlocked: The FBI is now removing malware from personal computers. The US Taxpayer is paying the FBI $11 Billion dollars per year, and we only got one strain of malware removed? Is this a 4th Amendment issue? In this case the warrant was given only after

Matt Zorich (@reprise_99) 's Twitter Profile Photo

I think a lot of organizations underestimate how many modern cybercriminals have become experts in business process on top of more traditional technical ability. This is reflected most commonly through social engineering, but it manifests in other ways too. Many cybercriminals

Jack Rhysider 🏴‍☠️ (@jackrhysider) 's Twitter Profile Photo

Saw a guy hunting for threat actors in the network today. No SIEM. No IDS. No EDR. He just sat there. Watching traffic in wireshark. Like a psychopath.