🚨 Upcoming Secure by Default Settings Changes for Exchange and Teams APIs
Starting late October to November 2025, Microsoft will require admin consent for third-party apps accessing Exchange and Teams content via Microsoft-managed default consent policy. Finally!👏…
Dear Threat Actors,
I need Robux. Give me Robux. I know you're all a bunch of fucking degenerates spending your drainer money on that fucking game. Don't be stingy.
Found some bullshit Roblox game. There is Robux spent leaderboard. Someone spent over $100,000 in this game.
I…
We are releasing details on BRICKSTORM malware activity, a China-based threat hitting US tech to potentially target downstream customers and hunt for data on vulnerabilities in products. This actor is stealthy, and we've provided a tool to hunt for them. cloud.google.com/blog/topics/th…
Friendly reminder, having a CISSP doesn't make you a good job candidate for exactly the same reason as having a drivers license doesn't make you a good driver
If you’re just stepping into cybersecurity, there are two brutal truths you must tattoo into your brain
1) No system is ever 100% secure. Once you accept this fact, you will be free. The name of the game is prioritization. If you're not sure, prioritize some more.
2) Jeffrey…
Update: Microsoft has released security updates that fully protect customers using all supported versions of SharePoint affected by CVE-2025-53770 and CVE-2025-53771.
Update: Microsoft has released security updates that fully protect customers using all supported versions of SharePoint affected by CVE-2025-53770 and CVE-2025-53771.
Microsoft has continuously observed hybrid attacks leading to espionage, business interruption, and ransomware deployment that involve threat actors moving from on-premises environments to the cloud. Many organizations manage their resources across different realms, including…
Microsoft and CrowdStrike are teaming up to create alignment across our threat actor taxonomies, mapping where knowledge of these actors align to enable security professionals to connect insights faster and make decisions with greater confidence. msft.it/6011SlOZ9
Microsoft has discovered worldwide cloud abuse activity by new Russia-affiliated threat actor Void Blizzard (LAUNDRY BEAR), whose cyberespionage activity targets gov't, defense, transportation, media, NGO, and healthcare in Europe and North America. msft.it/6011S9JpN
Over the past year, Microsoft Threat Intelligence observed the persistent growth and operational sophistication of Lumma Stealer, an infostealer malware used by multiple financially motivated threat actors to target various industries. msft.it/6010Sd2zi
🚨 Fake CAPTCHA Evolution: Homoglyphs & Unicode
⚠️ The user sees a #CAPTCHA that prompts to press a few buttons instead of just clicking a checkbox. Pressing the keys triggers code execution, leading to system compromise.
👨💻 Using #ANYRUN Sandbox, security teams can dive into…
Microsoft Threat Intelligence observed a new and notable method used by the threat actor Storm-0249 for distributing the Latrodectus trojan, a malware loader designed to facilitate multi-stage attacks by downloading and installing additional payloads onto compromised devices.
Microsoft Incident Response researchers uncovered a novel remote access trojan (RAT) that demonstrates sophisticated techniques to evade detection, persist in the target environment, and exfiltrate sensitive data. msft.it/6013qVXAl
Proofpoint researchers have identified two active #accounttakeover (#ATO) campaigns, tracked as UNK_PanicPulse & UNK_MistyMirror, targeting #Microsoft365 accounts.
Since March 2024, both clusters have affected 6K+ accounts across 1.4K+ orgs, using botnets & unique client agents.
The Kusto query language (KQL) query assistant capability in Security Copilot allows threat hunters to generate KQL queries for advanced hunting and reduces the time it takes to write a hunting query from scratch. msft.it/6017qR9Vb
2K Followers 1K FollowingYesterday is history. Tomorrow is a mystery.
Cloud Solutions Engineer at Contoso. Hacktive Directory admin.
Posts don't represent my employer(s).
4K Followers 803 FollowingStay ahead of cyber threats. Get real-time alerts on notable APT/FIN/ORB indicators from VirusTotal. A threat intel project by @craiu.
285K Followers 198K FollowingDual board certified #MIGS & #OBGYN - against #genitalmutilation & #sterilization of kids under 18 for #GenderAffirming Surgery
https://t.co/HRJLpqSuxG
13K Followers 10K FollowingMost companies only realise they are breached when informed by a 3rd party. This is a stupid problem! Thinkst Canary. Know. When it Matters.
213 Followers 2K FollowingMUSLIM 🙏 MOURIDULAHI 📿. لا إله إلا الله IN GOD WE TRUST PUT GOD FIRST . 🖥️IT. 🏴☠️CYBER-SECURITY , "(PENTESTER)" 🧑💻C. ETHICAL HACKING
10K Followers 7K FollowingDivergent Information Security Protector | Sharing insights on data breaches and information security • Founder https://t.co/ZRkBIIRbt9
29K Followers 206 FollowingHacker at @OutsiderSec. Researches AD and Azure (AD) security. Likes to play around with Python and write tools that make work easier.
2K Followers 1K FollowingYesterday is history. Tomorrow is a mystery.
Cloud Solutions Engineer at Contoso. Hacktive Directory admin.
Posts don't represent my employer(s).
24K Followers 270 Followingai research, software engineering, infra & hardware, on a mission to build a DGX B300 GPU cluster, i moderate GPUs on r/LocalLLaMA
11K Followers 730 Following// unethical hacker
// cybersecurity leader: megacorp, usa
// ex big tech, else
// @redteamvillage_ & @sec_defcon daemon
// take sincerely at your own risk
55K Followers 3K FollowingEvery day I write about #osint (Open Source Intelligence) tools and techniques. Also little bit about forensics and cybersecurity in general. Work in @netlas_io
68K Followers 6K FollowingCurrent: @NCITE_COE — I read a lot of court records because I like a good story. Won a Pulitzer that one time. “A well-known PACER watcher” - Justice Department
4K Followers 803 FollowingStay ahead of cyber threats. Get real-time alerts on notable APT/FIN/ORB indicators from VirusTotal. A threat intel project by @craiu.
145K Followers 215 FollowingWe are the Microsoft Security Response Center. To report security vulnerabilities or abuse in Microsoft products, visit https://t.co/kxEbdfMny1.
884K Followers 52 Followingwe invest in software eating the world
https://t.co/A9eTFq6plZ
https://t.co/MXGUBJoesw
Watch "The Ben & Marc Show": https://t.co/eRuDhx7kpe
59K Followers 134 FollowingWe make tinygrad and sell tinybox, the best perf/$ AI computer.
$25k for 4x 5090 in a quiet box.
Our mission is to commoditize the petaflop.
31K Followers 570 FollowingConsultant for InfoSec Innovations | @SANSInstitute Principal Instructor | @IANS_Security Faculty | I like information security. How about you?
39K Followers 1K FollowingHead of Global Signals Operations @Google Threat Intelligence Group via @Mandiant acquisition. Posts are attributable to me—not my employer. Former @USMC.