Identity security isn't one-size-fits-all.
@jaredcatkinson spoke to @campuscodi for Risky Business News about how classifying identities into two distinct categories — identities at rest and identities in transit — changes how we approach security.
🎧: ghst.ly/4pB9rWL
Certificate-based privilege escalation vulnerabilities are the attack vector enterprises keep overlooking.
Join @leidy_tector at #BSidesNYC on Oct. 18 to learn a structured approach to ADCS remediation using attack path analysis and BloodHound Enterprise. ghst.ly/3J0BxKt
Red teams slip past detection. Defenders adapt. The cycle continues. 🔄
John Wotton's latest on AI gated loaders shows how offensive operators are using LLMs to make shellcode execution context-aware, executing only when OPSEC policies are met. ghst.ly/4nvxsgh
Securing Domain Controllers without breaking AD is harder than it sounds. @MGrafnetter at @HIPConf covers:
✅ IaC approach to Windows Firewall policy
✅ RPC filters & outbound traffic controls
✅ Hybrid environment challenges
✅ Network service discovery
hipconf.com/agenda/
What happens when the User-Account-Restrictions property gets misconfigured?
Spoiler: It's not good. From account compromise to full domain takeover, @unsigned_sh0rt breaks down why this permission set is more dangerous than most realize. ghst.ly/4mKgycH
Move beyond signature-based detection to catch what traditional defenses miss. Our Detection course at Specter Bash next week will teach you to engineer detections based on adversary TTPs & behavioral analysis.
There's still time to save your spot! 👉 lnkd.in/eP58JqcU
Lateral movement getting blocked by traditional methods?
@werdhaihai just dropped research on a new lateral movement technique using Windows Installer Custom Action Server, complete with working BOF code. ghst.ly/4pN03PG
Hidden attack paths are why attackers succeed despite top security tools. They exploit identity & permission connections most orgs can't see.
At @HIPConf, @JustinKohler10 will share how to reveal these routes with BloodHound & shift to prevention. ghst.ly/3W6nxlc
Think like an attacker & defend like a strategist. Our Tradecraft Analysis course at Specter Bash 2025 teaches you to:
✅ Transform telemetry → detection coverage
✅ Assess if your defenses work
✅ Bridge offensive tactics w/ analytic precision
🎟️: ghst.ly/specter-bash-2…
It's time to change how you think about SaaS integrations.
The Salesloft attack shows how GitHub → AWS → Drift → Salesforce created an attack highway defenders never saw coming.
@jaredcatkinson's analysis details the patterns we should look out for. ghst.ly/4ngDQrD
Better late than never. I wrote a post that analyzes the Salesloft-Drift breach in the context of Attack Paths.
specterops.io/blog/2025/09/2…
My main takeaways:
1) Hybrid paths are not limited to two platforms owned by the same organization
2) Ad-hoc paths arise when passwords are…
224K Followers 6K FollowingFounder @Binary_Defense @TrustedSec Co-Owner https://t.co/HQC75WhdJh. @WeHackHealth Pod. God + Family/Hacker/CSO/USMC/Intel/Fitness. Make the world a better place.
17K Followers 2K FollowingTargeted Ops Red Team @ TrustedSec | Hacking since Renegade BBS backdoors | Prior CrowdStrike/BHIS | In Christ's grip | Fighter for truth | K1HAQ
26K Followers 1K FollowingSenior Security Consultant @TrustedSec | Military grade meme poster, researcher, cloud penetration tester, voider of warranties. My thoughts are my own.
31K Followers 570 FollowingConsultant for InfoSec Innovations | @SANSInstitute Principal Instructor | @IANS_Security Faculty | I like information security. How about you?
12K Followers 490 FollowingSr. Penetration Tester / Red Team Operator @ptswarm :: Author of the Pentester’s Promiscuous Notebook :: He/him :: Tweets’re my pwn 🐣
2 Followers 25 FollowingNous offrons des services en cybersécurité, tels que vérification de posture de sécurité, conseils d'architecture, tests de sécurité éthique et sécurité SDLC.
119 Followers 1K FollowingFixing tech, breaking illusions. Powered by snark, sarcasm, irony, & the slow collapse of civilization. I'm the dude playin the dude, disguised as another dude!
186 Followers 650 FollowingTechnology consultant with more than 18 years’ experience in bringing to market new solutions. #storage #cloud #Virtualization #automation #security
52 Followers 836 FollowingMy Goal is Change My Country
India is super powerful country of World
HELP INDIA PUBLIC
🇮🇳JAI HIND JAI BHARAT 🇮🇳
I LOVE MY INDIA
224K Followers 6K FollowingFounder @Binary_Defense @TrustedSec Co-Owner https://t.co/HQC75WhdJh. @WeHackHealth Pod. God + Family/Hacker/CSO/USMC/Intel/Fitness. Make the world a better place.
17K Followers 2K FollowingTargeted Ops Red Team @ TrustedSec | Hacking since Renegade BBS backdoors | Prior CrowdStrike/BHIS | In Christ's grip | Fighter for truth | K1HAQ
29K Followers 206 FollowingHacker at @OutsiderSec. Researches AD and Azure (AD) security. Likes to play around with Python and write tools that make work easier.
62K Followers 288 FollowingA kiwi coding mimikatz & kekeo
github: https://t.co/eS3LVgU6i0
Head of security services @banquedefrance
Tweets are my own and not the views of my employer
55K Followers 3K FollowingDirector of Intel at @redcanary. SANS Certified Instructor for FOR578: CTI. Senior Fellow at @CyberStatecraft. She/her. Mastodon: @[email protected]
109K Followers 97 FollowingThe world's leading Digital Forensics and Incident Response provider. This feed updates you on latest DFIR news, events, and training.
45K Followers 2K FollowingI will light the way by the bridges I burn.
Retired Senior SANS Instructor
IANS Faculty
Black Hills Information Security
Active Countermeasures
30K Followers 561 FollowingCyBeRsEcUrItY | Not afraid to put down with some THICC malware on disk | securing and breaking AI @PaloAltoNtwks | Ex @spacex
49K Followers 339 FollowingSecurity researcher in Google Project Zero. Author of Attacking Network Protocols. Tweets are my own etc. Mastodon: @[email protected]
2K Followers 261 FollowingAdversary Simulation @xforce/ Frequent reader of the first page of Google results / Occasional reader of the second page of Google results
4.4M Followers 3 FollowingOpenAI’s mission is to ensure that artificial general intelligence benefits all of humanity. We’re hiring: https://t.co/dJGr6Lg202
405 Followers 70 FollowingAnsa is a venture capital firm focused on creating a new model for founders: equal, aligned, and relentless. We make investments in Series A-C companies.
12K Followers 314 FollowingOur mission is to accelerate the future of technology through investments, insights, and meaningful partnership with Microsoft.
3K Followers 264 FollowingCisco Investments is the corporate development and venture capital arm of Cisco, investing in enterprise technology Series A and beyond.
18K Followers 410 FollowingFeaturing targeted security news & information for end-users, executives, vendors, integrators & more. Updates by Rodney Bosch, Samantha Schober & Paul Rothman.
566 Followers 655 FollowingSenior Security Consultant @ Reversec (fka @withconsulting).
Talks mostly about security.
As Rino put it, sometimes maybe good sometimes maybe shit
43K Followers 2K FollowingCIS makes the connected world a safer place for people, businesses, and governments through our core competencies of collaboration and innovation.
5K Followers 223 Following#MemCM #Infosec enthusiast. “Non-limited code execution will almost certainly result in full system compromise over time.” #WDAC. 20 years of MVP citizenship.
11K Followers 7 FollowingBlue Team Con is an annual cybersecurity conference built for defenders, inclusive of anyone interested in safeguarding organizations. | 4-7 September 2025
105 Followers 223 Following🛡️ Visually helping to spread the message #DefenceInDepth starts with #Identity @SpecterOps - Tweets, satire and harmless opinions are my own.
33 Followers 32 FollowingAs CIO & CISO Strategic Advisors, SecureX is a next generation IT consulting and professional services firm with a heavy focus in Cybersecurity.
469 Followers 252 FollowingWhile we know perfection is hard to achieve, we always have it in our sights. Every day we work to improve and grow our IT solutions. Can you keep up?
3K Followers 487 FollowingGuidePoint Security provides trusted cybersecurity expertise, solutions, and services that help organizations make informed decisions and minimize risk.
497 Followers 415 Following#Wicked6 March 27-29 | 3-day virtual cyber games supporting #womenincyber around the world. 🌏@WomenCyberjutsu fundraiser by @playcyberleague @katzcyplaycyber
72 Followers 103 Following▶️ Connect, share and learn—join PlayCyber Global League today! PCGL is a program managed by @KatzcyPlayCyber @KatzcyLLC. Epic #CyberGames and #Esports for all!
6K Followers 2K Followinghttps://t.co/FgoEVVQjxv provides an online (free) hub for #government, #military & industry to locate expert & leadership guidance through 1000s of #publicsector events.
7K Followers 3K FollowingTrusted Government IT Solutions Provider® & top-ranked GSA Schedule Contract holder driving public sector IT modernization, tweeting the latest trends and news.
46K Followers 7K FollowingCRN, a media brand of The Channel Company, is the #1 trusted source for IT channel news, analysis and insight online and in print.