SwiftSolves's profile picture. Somewhere between last GenX and first Millennial. Living in the Azure Cloud.

Nathan Swift

@SwiftSolves

Somewhere between last GenX and first Millennial. Living in the Azure Cloud.

Vastgezet

So there is this thing, it is called the theory of planned behavior. You start to predict an individual's intentions to engage in a behavior at a specific time and place. I don't know if you've been looking at your phones or looking at your screens but be careful with your info.


Nathan Swift heeft deze post opnieuw geplaatst

In the Sandhills of NC, bees produce PURPLE honey. It’s the only place in the entire world where this happens. For my new followers…your Entomology lesson for the day.

BowTiedBroke's tweet image. In the Sandhills of NC, bees produce PURPLE honey. It’s the only place in the entire world where this happens. For my new followers…your Entomology lesson for the day.

Nathan Swift heeft deze post opnieuw geplaatst

CyberSec Trends Q4/25🔮 ⬆️NPM/PyPi/VSCode supply chain attacks ⬆️Rust/Go hack tools/malware ↗️EDR Blinding ↗️Abuse of legit RMM tools ↗️Token persistence/cloud API abuse ↗️Malicious LNK files ↗️.NET Single File Host ↗️ClickFix & FileFix ↗️Phishing w/ Job Ads

CyberSec Trends Q1/25🔮 ⬆️Lumma Stealer ↗️EDR killers (vulnerable drivers) ↗️Abuse of legit remote access tools ↗️0days in Fortinet & Ivanti ↗️Token persistence/cloud API abuse ⬆️Sliver implants ⬆️Fake CAPTCHA pages ⬆️Malvertising



Nathan Swift heeft deze post opnieuw geplaatst

Regular reminder… this hardening series by Jerry Devore is super awesome. There’s no way you won’t learn things by reading these. Part 1 - Disabling NTLMv1 Part 2 - Removing SMBv1 Part 3 - Enforcing LDAP Signing Part 4 - Enforcing AES for Kerberos Part 5 - Enforcing LDAP…


Nathan Swift heeft deze post opnieuw geplaatst

If you are curious about what kind of questions I ask when interviewing for my team, I thought I would share some examples. I usually cover everything identity, whether that is on premises Active Directory, Entra, OAuth and everything in between. In general, I try to ask…


Nathan Swift heeft deze post opnieuw geplaatst

A penetration tester got root access to our Kubernetes cluster in 15 minutes. Here's what they exploited. The attack chain: - Found exposed Kubernetes dashboard (our bad) - Dashboard had view-only service account (we thought this was safe) - Service account could list secrets…


Nathan Swift heeft deze post opnieuw geplaatst

The Tail of the Dragon is an 11 mile stretch of Highway 129. It begins near Robbinsville, NC and ends Tabcat Creek Bridge in Tennessee. It’s famous for its switchbacks without guardrails and sought out by sports car and motorcycle enthusiasts. ✌🏼

dogwoodblooms's tweet image. The Tail of the Dragon is an 11 mile stretch of Highway 129. It begins near Robbinsville, NC and ends Tabcat Creek Bridge in Tennessee.

It’s famous for its switchbacks without guardrails and sought out by sports car and motorcycle enthusiasts. ✌🏼

Good morning from North Carolina! 📍Tail of the Dragon

AmeliaMerica76's tweet image. Good morning from
North Carolina!

📍Tail of the Dragon


Nathan Swift heeft deze post opnieuw geplaatst

Why the Web was Down Today - Explained by a Retired Microsoft Engineer...


Nathan Swift heeft deze post opnieuw geplaatst

I wish there were a PowerShell module like Pandas. It could make a huge impact in DFIR and other areas.


Nathan Swift heeft deze post opnieuw geplaatst

10/17/2025: Every week I share a curated list of red team-specific jobs (or similar/adjacent) that caught my attention or were shared with me by others in the community. My goal is to help job hunters in the offensive security space find a red team-specific role. 🏛 Company +…

nickvangilder's tweet image. 10/17/2025: Every week I share a curated list of red team-specific jobs (or similar/adjacent) that caught my attention or were shared with me by others in the community. My goal is to help job hunters in the offensive security space find a red team-specific role.

🏛 Company +…

Nathan Swift heeft deze post opnieuw geplaatst

So true. I tell people this all the time - there are phases in your life where you just grind. Repetitive work, endless testing, boring tasks that feel redundant or pointless. But that’s where you’re forged. You don’t jump straight to the rewarding, visible, “interesting” stuff.…

“Greatness does not come out of intelligence, it comes from character. Character is not formed out of smart people: it is formed out of people who have suffered.” — Nvidia CEO, Jensen Huang



Nathan Swift heeft deze post opnieuw geplaatst

A small number of samples can poison LLMs of any size anthropic.com/research/small…

cyb3rops's tweet image. A small number of samples can poison LLMs of any size

anthropic.com/research/small…

Nathan Swift heeft deze post opnieuw geplaatst

If you asked me to describe the #hope of the #Gospel in one word...


Nathan Swift heeft deze post opnieuw geplaatst

Our team at Microsoft are hiring in Australia & New Zealand! If you want to come work with some super smart people, solve some of the biggest cyber security problems in the world and talk about NBA with me on Teams, we would love to hear from you! jobs.careers.microsoft.com/global/en/job/…


Nathan Swift heeft deze post opnieuw geplaatst

Following the guidance in these two articles, you can detect two of the most common password attacks against Active Directory: 1. Detect Password Spraying using a Honeypot account: trustedsec.com/blog/detecting… 2. Detect Kerberoasting using a Honeypot account: adsecurity.org/?p=3513

PyroTek3's tweet image. Following the guidance in these two articles, you can detect two of the most common password attacks against Active Directory:

1. Detect Password Spraying using a Honeypot account:
trustedsec.com/blog/detecting…

2. Detect Kerberoasting using a Honeypot account:
adsecurity.org/?p=3513

Nathan Swift heeft deze post opnieuw geplaatst

Many commented that determining when a breach began depends on how long the victim retains its logs. That’s simply not true. Log data is just one piece of forensic evidence, and often not even the most reliable. Analysts can build timelines from dozens of other artifacts – file…

What really bothers me is that neither F5’s statement nor the attestation letters from NCC Group or IOActive mention when the breach actually happened. They only say that F5 “learned” about it in August 2025. That’s not when it started. There must be forensic evidence pointing…



Nathan Swift heeft deze post opnieuw geplaatst

If you're needing some reading, I have a list of good hacker blogs here. midnightcomputerlab.net/directory/

nyxgeek's tweet image. If you're needing some reading, I have a list of good hacker blogs here.

midnightcomputerlab.net/directory/

Nathan Swift heeft deze post opnieuw geplaatst

Grandfather Mountain, NC area today. Absolutely beautiful!

app_life_'s tweet image. Grandfather Mountain, NC area today. Absolutely beautiful!

Nathan Swift heeft deze post opnieuw geplaatst

GreyNoise Feeds are here: real-time webhook alerts for CVE status changes, exploitation spikes, and IP classification changes. No more polling. Respond the moment threats emerge. 🦾 greynoise.io/blog/introduci…

greynoise.io

Introducing GreyNoise Feeds: Real-Time Intel for Real-Time Response

Learn how GreyNoise Feeds enable real-time, event-driven threat intelligence that eliminates polling delays—helping defenders react instantly to new exploits, IP threats, and zero-day activity.


Loading...

Something went wrong.


Something went wrong.