secabstraction

@secabstraction

Security Engineer, O365. Tweets are my own.

Seattle, WA
Vrijeme pridruživanja: siječanj 2014.

Tweetovi

Blokirali ste korisnika/cu @secabstraction

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @secabstraction

  1. 18. sij

    This would be an excellent team to join if you’re looking!

    Poništi
  2. 30. pro 2019.
    Poništi
  3. 18. pro 2019.

    if you felt a disturbance in the force... it's me 😈

    Poništi
  4. proslijedio/la je Tweet
    13. stu 2019.

    Do you want to work in a security research org with awesome people who thrive on collaboration? Do you want to change the way Threat Intelligence is produced and consumed to make the world more secure? Do you want to work with me? :) We’re hiring!

    Prikaži ovu nit
    Poništi
  5. proslijedio/la je Tweet
    7. stu 2019.

    Being able to work with security researchers to confirm their findings and share the insights and intelligence from the visibility we have into the threat landscape from our dataset is incredibly exciting and inspiring. I’m really proud to be part of my team and what we do.

    Prikaži ovu nit
    Poništi
  6. proslijedio/la je Tweet

    We are building Azure as the only cloud with limitless data and analytics capabilities across our customers’ entire data estate, bringing hyperscale capabilities to our relational database services. Take a look.

    Poništi
  7. 26. srp 2019.
    Poništi
  8. proslijedio/la je Tweet
    20. srp 2019.

    We need more of this in our world. RT to spread joy. Thank you !

    Poništi
  9. 17. srp 2018.
    Poništi
  10. proslijedio/la je Tweet

    the malicious package story shocked you? 😱 there are several facets to supply chain attacks that you should be aware of 🚨 a quick read and let's discuss how to make the ecosystem great again! (was it ever? ;-))

    , , i još njih 5
    Poništi
  11. proslijedio/la je Tweet
    19. lip 2018.

    [BLOG] Tokenvator: A Tool to Elevate Privilege using Windows Tokens - More nice work from Alexander Leary ()! Lots of interesting use cases ;)

    Poništi
  12. proslijedio/la je Tweet
    14. lip 2018.

    Initial integration of w/ ! 😊🍻💜 & I worked on this together to share an easier way to explore and interact with up to date ATT&CK content available in STIX via public TAXII server Link:

    Poništi
  13. proslijedio/la je Tweet
    18. lip 2018.

    PoC||GTFO is the single greatest source of motivation for me in infosec currently. IMO nothing out there better captures the application of our collective skill set in the pursuit of pure curiosity and fun. Thank you to all contributors and especially to !

    Poništi
  14. proslijedio/la je Tweet
    15. lip 2018.

    Collaboration is king when it comes to protecting customers. Check out ’s piece on the 2nd annual Security Data Science Colloquium

    Prikaži ovu nit
    Poništi
  15. proslijedio/la je Tweet

    Want to help us support the amazing women in security? Simply RT and we’ll donate £1 to the Women’s Security Society for every retweet and post using ! Spread the word!

    Poništi
  16. 4. lip 2018.
    Poništi
  17. proslijedio/la je Tweet
    17. svi 2018.

    OSSEM!! 😊🍻💜 Don't just collect event logs. Understand & document every single one, standardize your pipeline to allow the correlation of multiple data sets and identify the needed data and relationships to develop analytics. The Basis of

    Poništi
  18. proslijedio/la je Tweet
    1. svi 2018.

    A PDF to help you find the documentation resources and other technical information that you need to learn about the command shell, and to automate command-line tasks using scripts or scripting tools.

    Poništi
  19. proslijedio/la je Tweet
    1. svi 2018.

    Here is my write up on how I found a neat privilege escalation bug in CylancePROTECT:

    Poništi
  20. proslijedio/la je Tweet
    26. tra 2018.

    2 new releases today exploiting default settings in AD! First: Invoke-ACLPwn, a PowerShell script to exploit ACL paths detected by . Second is the ACL attack for ntlmrelayx: relaying machine accounts for DA! Code: Blog:

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·