Nathan Swift
@SwiftSolves
Somewhere between last GenX and first Millennial. Living in the Azure Cloud.
你可能会喜欢
So there is this thing, it is called the theory of planned behavior. You start to predict an individual's intentions to engage in a behavior at a specific time and place. I don't know if you've been looking at your phones or looking at your screens but be careful with your info.
A penetration tester got root access to our Kubernetes cluster in 15 minutes. Here's what they exploited. The attack chain: - Found exposed Kubernetes dashboard (our bad) - Dashboard had view-only service account (we thought this was safe) - Service account could list secrets…
The Tail of the Dragon is an 11 mile stretch of Highway 129. It begins near Robbinsville, NC and ends Tabcat Creek Bridge in Tennessee. It’s famous for its switchbacks without guardrails and sought out by sports car and motorcycle enthusiasts. ✌🏼
Good morning from North Carolina! 📍Tail of the Dragon
Why the Web was Down Today - Explained by a Retired Microsoft Engineer...
I wish there were a PowerShell module like Pandas. It could make a huge impact in DFIR and other areas.
10/17/2025: Every week I share a curated list of red team-specific jobs (or similar/adjacent) that caught my attention or were shared with me by others in the community. My goal is to help job hunters in the offensive security space find a red team-specific role. 🏛 Company +…
So true. I tell people this all the time - there are phases in your life where you just grind. Repetitive work, endless testing, boring tasks that feel redundant or pointless. But that’s where you’re forged. You don’t jump straight to the rewarding, visible, “interesting” stuff.…
“Greatness does not come out of intelligence, it comes from character. Character is not formed out of smart people: it is formed out of people who have suffered.” — Nvidia CEO, Jensen Huang
A small number of samples can poison LLMs of any size anthropic.com/research/small…
Our team at Microsoft are hiring in Australia & New Zealand! If you want to come work with some super smart people, solve some of the biggest cyber security problems in the world and talk about NBA with me on Teams, we would love to hear from you! jobs.careers.microsoft.com/global/en/job/…
Following the guidance in these two articles, you can detect two of the most common password attacks against Active Directory: 1. Detect Password Spraying using a Honeypot account: trustedsec.com/blog/detecting… 2. Detect Kerberoasting using a Honeypot account: adsecurity.org/?p=3513
Many commented that determining when a breach began depends on how long the victim retains its logs. That’s simply not true. Log data is just one piece of forensic evidence, and often not even the most reliable. Analysts can build timelines from dozens of other artifacts – file…
What really bothers me is that neither F5’s statement nor the attestation letters from NCC Group or IOActive mention when the breach actually happened. They only say that F5 “learned” about it in August 2025. That’s not when it started. There must be forensic evidence pointing…
If you're needing some reading, I have a list of good hacker blogs here. midnightcomputerlab.net/directory/
Attacker infrastructure evolves in real time. Your defenses should too. Introducing GreyNoise Block, ensuring your blocklists update automatically. 🦾 greynoise.io/blog/introduci…
Grandfather Mountain, NC area today. Absolutely beautiful!
GreyNoise Feeds are here: real-time webhook alerts for CVE status changes, exploitation spikes, and IP classification changes. No more polling. Respond the moment threats emerge. 🦾 greynoise.io/blog/introduci…
What’s much more interesting to me than detecting vulnerable services from server responses is detecting exploited services from log files. Detecting services by server responses is useful, especially for red teams and anyone scanning their own network, but it’s only the first…
🚨 Critical zero-day tagged as CVE-2025-61882 (CVSS 9.8) affecting Oracle E-Business Suite I've created a vulnerability detection script here: github.com/rxerium/CVE-20… This vulnerability is remotely exploitable without authentication. Patches are available as per Oracle's…
Another day another fighting a website’s pointless AI chatbot like it’s a text-based RPG just to get a simple link.
For those of you who don’t know: I’m a native hillbilly from Haywood County. My background is littered with poverty and trauma. That includes watching my baby sister go into foster care after the death of my Daddy. Thankfully, one of her placements was at Black Mountain Home…
Help Black Mountain Home for children raise $350,000 with just a couple of clicks to vote for them for the @ChickfilA True inspiration award. Also Sharing and commenting on this is free!! Thank you guys! Share share share.
Your next team building exercise will be...
United States 趋势
- 1. Walt Weiss 1,515 posts
- 2. $BARRON 2,300 posts
- 3. Harvey Weinstein 4,432 posts
- 4. Diane Ladd 4,557 posts
- 5. Snit N/A
- 6. Braves 9,403 posts
- 7. #warmertogether N/A
- 8. Ben Shapiro 31.7K posts
- 9. $PLTR 18.9K posts
- 10. Cardinals 12.7K posts
- 11. Teen Vogue 1,675 posts
- 12. Laura Dern 2,277 posts
- 13. Gold's Gym 54.5K posts
- 14. Monday Night Football 5,137 posts
- 15. iOS 26.1 3,657 posts
- 16. McBride 3,417 posts
- 17. Schwab 4,149 posts
- 18. #NXXT 2,517 posts
- 19. Blueface 5,355 posts
- 20. #maddiekowalski 4,416 posts
Something went wrong.
Something went wrong.