
Felix Jr.
@Nulloop
Sec ops tool-building wizard, thrives on detections and keyboard clacking. + https://c2sight.com + https://hackerjobs.com
You might like
My @BSides_NoVA talk from Saturday was called “10 Ways to Improve Entra ID Security Quickly”. I focused on the areas that tend to be missed in Entra ID. Talk slides are now posted. Download the slides: adsecurity.org/?p=4799

Just got lvl 8 in Google reviews but honestly it’s a community service being done because there’s not benefit. I travel for food, culture, and experiences.

Microsoft Threat Intelligence has observed a financially motivated threat actor, Storm-2657, compromising employee accounts to gain unauthorized access to profiles and divert salary payments to attacker-controlled accounts. msft.it/6016s0hvp Storm-2657 is actively…
microsoft.com
Investigating targeted “payroll pirate” attacks affecting US universities | Microsoft Security Blog
Microsoft Threat Intelligence has identified a financially motivated threat actor that we track as Storm-2657 compromising employee accounts to gain unauthorized access to employee profiles and...
You can just build a service for yourself rather than destroy a great free product. There’s three URIs to hit. This is a function I created to do the enumeration.

As some dipsh*t is again enumerating the whole universe using #AADInternals #OSINT tool, the service is now closed until further notice.

Every lens leaves a blur signature—a hidden fingerprint in every photo. In our new #TPAMI paper, we show how to learn it fast (5 mins of capture!) with Lens Blur Fields ✨ With it, we can tell apart ‘identical’ phones by their optics, deblur images, and render realistic blurs.

Detecting OAuth Token Compromise: Insights from the SalesLoft Drift Incident open.substack.com/pub/detections…
from what?
This AdGuard Family Security Suit deal protects your whole family bleepingcomputer.com/offer/deals/th…
This is actually a really solid context engineering template. Kudos, @AnthropicAI

The 3 maturity levels of Conditional Access: Good: Basic location-based blocks - ip, device trust Better: Risk-based adaptive policies - device compliance, App-specific protections More Better: Zero Trust architecture
The 3 maturity levels of Application Control... Good: Software Restriction Policies Better: AppLocker More Better: WDAC/3rd Party Solution
If you support Firefox or Chrome in your environment, you need to enable these features if you want to use device identity in Conditional Access policies Without this, anything using filter for devices, compliance, or hybrid join requirements will likely fail
For Firefox, we need to enable Windows SSO as it is not enabled by default: mozilla.github.io/policy-templat… For Chrome, we need to enable CloudAP as it is not enabled by default: chromeenterprise.google/policies/#Clou…


United States Trends
- 1. Flacco 26.8K posts
- 2. Bengals 46.5K posts
- 3. Ramsey 11.2K posts
- 4. Rodgers 26K posts
- 5. Chase 87.4K posts
- 6. Tomlin 6,730 posts
- 7. Ace Frehley 71.5K posts
- 8. DJ Turner 1,682 posts
- 9. Max Scherzer 5,335 posts
- 10. #TNFonPrime 3,079 posts
- 11. Cuomo 57.8K posts
- 12. #HereWeGo 7,468 posts
- 13. #911onABC 15K posts
- 14. #WhoDey 3,112 posts
- 15. #PITvsCIN 3,344 posts
- 16. Bolton 183K posts
- 17. Sliwa 26.1K posts
- 18. Mookie 10.2K posts
- 19. Metcalf 4,888 posts
- 20. Mamdani 180K posts
You might like
-
Roberto Rodriguez 🇵🇪
@Cyb3rWard0g -
Ryan "Chaps" Chapman
@rj_chap -
Lee Chagolla-Christensen
@tifkin_ -
NOPResearcher
@NopResearcher -
Dave Aitel
@daveaitel -
lazzslayer
@lazzslayer -
The Haag™
@M_haggis -
Devon Kerr
@_devonkerr_ -
Drunk Binary
@DrunkBinary -
Johannes Ullrich
@johullrich -
nullcookies
@nullcookies -
jungman
@notajungman -
Ohm-I (Oh My)
@mcohmi -
Tom.G
@TomG_963 -
anubis
@AnubisOnSec
Something went wrong.
Something went wrong.