Mark Sewell

1.7K posts

Mark Sewell

Mark Sewell

@MarkSewe

I work as an InfoSec and Infrastructure specialist living in the U.K. In my spare time, I enjoy football and boxing! All views expressed here are my own.

UK Katılım Mayıs 2013
1.2K Takip Edilen247 Takipçiler
Boxing💪🏽
Boxing💪🏽@BowenBoxing·
David Haye on commentary, reminds me of the day he got destroyed…
English
52
42
1.7K
120K
Omri Segev Moyal
Omri Segev Moyal@GelosSnake·
In every incident I work, browser extensions are the last thing anyone checks. They're not in your EDR. Not in your SIEM. And they update themselves before anyone notices. @mthcht2 built the tool to fix this. 🧵
English
6
14
145
16.8K
Mark Sewell
Mark Sewell@MarkSewe·
@IAMERICAbooted Can you find a partner in crime, someone like minded from a team that also likes to get stuff done? I’ve found that works, also raising issues to your CISOs or boss, if it’s a niche no one is owning can you claim it and drive resolution?
English
1
0
1
18
EZ
EZ@IAMERICAbooted·
I miss doing IR. I get invigorated during the hunt. I never get bored with looking at logs. My cloud skills are well suited in that space. My love will always be IAM, but finding another opportunity like my last job will be near impossible. I love my current job. My boss is amazing. My CISOs (yes, plural) are amazing. But I just feel underutilized and pigeon-holed into a small enclave, albeit a very important one. I dont want to leave my company or anything, I just want more diversity in my activities. How does one achieve that?
English
9
0
48
3K
Mark Sewell
Mark Sewell@MarkSewe·
@UK_Daniel_Card @akses_0x00 Turn off all the automated summaries in settings / copilot. We had it summarising everything for all SOC analysts every time someone entered an incident.. thankfully they fixed it.
English
1
0
1
49
Mark Sewell
Mark Sewell@MarkSewe·
@ainp0t @NathanMcNulty @IAMERICAbooted How are you monitoring this via entra idp or XDR? I think they gave some options to suppress lower fidelity detections within XDR. Which could explain what you are seeing.
English
1
0
1
26
F T
F T@ainp0t·
@NathanMcNulty , @IAMERICAbooted or anyone. Does Entra ID Protection work properly in your environments? I have reviewed two environments where SecurityAlerts(IPC) events have dropped to 0 end of January and looking at history, this is not normal
English
2
0
3
293
Nathan McNulty
Nathan McNulty@NathanMcNulty·
If you aren't enforcing a browser extension allowlist, the time to change that was yesterday :( It's not that creating malicious extensions was hard before, the volume was lower @byteben has an excellent guide to inventory and lock down extensions here: msendpointmgr.com/2025/10/04/tam…
David Ch@chhddavid

BREAKING: @claudeai just got a massive upgrade today and I'm so happy to be a part it. From now on, Claude Opus 4.6 can build Chrome Extensions for every Chromium-based browser. We just launched Shipper, a tool that lets Claude: ✅ Build complete Chrome Extensions ✅ Recreate existing Extensions ✅ Ensure multi-browser comatibility ✅ Write privacy policies ✅ Autofill entire Chrome Web Store listings Claude Opus 4.6 can do all the above in 1 simple prompt for as low as $0.11/extension... And it takes minutes, not hours! Open up Shipper and ask Claude to "create a free ad block extension" or "auto-invite 950 people weekly on linkedin". Since this is a very special launch, if you comment "shipper" you will get FREE credits :)

English
7
41
163
21.4K
The United Stand
The United Stand@UnitedStandMUFC·
🚨 Man Utd could be in BIG TROUBLE 🚨 What are your thoughts on this? 👇
English
38
21
355
55K
Mark Sewell
Mark Sewell@MarkSewe·
@_xDeJesus @NathanMcNulty @merill @fabian_bader Feels like a step in the right direction, sadly its too broad and captures all app consent granted within the tenant. I struggled to see any identifier that highlighted the consent came from Implicit grant flow :-s
English
1
0
0
51
Terrance DeJesus
Terrance DeJesus@_xDeJesus·
Just tested this with an emulated implicit grant flow. I could be wrong but Entra ID sign-in logs didn't capture anything to distinguish it was an implicit consent grant flow. Could be subjective to my testing tenant too. The relevant fields in sign-in logs all show none: - authenticationProtocol: none - clientCredentialType: none - incomingTokenType: none Audit logs seem to be a good start? ``` AuditLogs | where OperationName == "Consent to application" ``` #audit-logs" target="_blank" rel="nofollow noopener">learn.microsoft.com/en-us/entra/id…
Terrance DeJesus tweet media
English
1
0
1
121
Mark Sewell
Mark Sewell@MarkSewe·
I'm trying to determine how widespread usage of Implicit Grant flow is, has anyone determined a good way to identify this from the entra portal / KQL? @NathanMcNulty @merill @fabian_bader any ideas?
English
1
1
1
1.1K
Vincent Teoh
Vincent Teoh@Vincent_Teoh·
Wow! Sony's restructuring its TV business by forming a joint venture company with TCL (TCL 51%; Sony 49%), which will then take over Sony's home entertainment business (including BRAVIA TV). I'm still wrapping my head around this deal, but what do you think of this seismic news?
Vincent Teoh tweet media
English
252
195
2.4K
277.4K
Mark Sewell
Mark Sewell@MarkSewe·
@Kostastsale Totally get it, my point was more collecting data is great. But it’s only useful if insightful and usable. Ticking a collection box is one thing, it leading to a detection, response action or supporting an investigation are somewhat different.
English
1
0
0
32
Kostas
Kostas@Kostastsale·
Thank you Mark. I get the point, but those examples are really symptoms of a larger issue. The underlying problem is that EDR comparisons today are inconsistent and ambiguous, which makes it hard to understand real differences between products. This service exists to remove that ambiguity by standardizing the feature set across vendors, applying the same definitions everywhere, and using a simple scoring model backed by written justification. The focus is on documenting how capabilities are exposed and under what conditions, not on walking through specific investigation scenarios. The end result is a vendor-neutral comparison that teams can actually use to compare products side by side and defend their decisions without relying on demos or marketing narratives. I think what you’re describing is better covered by MITRE ATT&CK and MITRE Engenuity Evaluations, which focus on attack flows and detection performance rather than feature-level comparison.
English
1
0
0
64
Kostas
Kostas@Kostastsale·
𝗪𝗲’𝗿𝗲 𝗲𝘅𝗽𝗮𝗻𝗱𝗶𝗻𝗴 𝘁𝗵𝗲 𝗘𝗗𝗥 𝗖𝗼𝗺𝗽𝗮𝗿𝗶𝘀𝗼𝗻 𝗣𝗿𝗼𝗷𝗲𝗰𝘁 𝗶𝗻 𝗮 𝗯𝗶𝗴 𝘄𝗮𝘆 𝘀𝘁𝗮𝗿𝘁𝗶𝗻𝗴 𝗻𝗲𝘅𝘁 𝘄𝗲𝗲𝗸! A new Advanced tier will expose our analysis, justification, and expert opinion for every feature across all EDR vendors. A new Enterprise tier will also introduce highly requested additions, including dedicated assistance with EDR selection and time allocated for focused research. We’re also integrating MITRE ATT&CK evaluation into our data, dashboards, and scoring engine for a more complete EDR comparison. Pricing will change for new Basic and Advanced tiers. Early adopters are grandfathered into Basic and will get a limited-time, heavily discounted upgrade to Advanced. This year, we’ve helped hundreds of people better understand how EDRs actually work through the EDR Telemetry Project and the EDR Comparison Service, and supported multiple enterprises in finding the right EDR for their needs. We’re here for the long run, with big plans for the new year and what’s ahead. 🔗 edr-comparison.com
English
1
10
47
3.5K
Rudy Ooms
Rudy Ooms@Mister_MDM·
@itlararenJesper It is... and when the "fast lane" is there.. things will become even better
English
1
0
1
232
Rudy Ooms
Rudy Ooms@Mister_MDM·
The 8 Hour Intune Sync Myth: What Really Happens When You Change a Policy Everyone believes Intune policies only sync every eight hours… what if I told you that isn’t true? The moment you change a policy, Intune contacts the Windows Notification Service to send a push that tells the device to check in. But as always, there’s a catch. A quiet throttle decides when the next push is allowed to proceed. Want to know more? Read the full story: P.S: Big changes are coming!!! The new fast lane will make those pushes even quicker. #Intune #MSIntune #Windows #Windows11 #WindowsAutopilot patchmypc.com/blog/intune-po…
Rudy Ooms tweet media
English
9
38
167
9.6K
Mark Sewell
Mark Sewell@MarkSewe·
@techspence Needs buy in from top down. Passwordless w/ Authenticator and WhfB super simple and a rare win.. for both usability and security. Level set it’s less passwords initially with passwordless the destination
English
1
0
1
212
spencer
spencer@techspence·
Help me out with this.. How easy is it currently to fully deploy passwordless authentication across an org? Bonus points for those who have done or are doing this currently.
English
44
6
96
17K
Mark Sewell
Mark Sewell@MarkSewe·
@IAMERICAbooted APT just goes to the file server and picks up someone’s password from the password.txt they shared on the drive to EVERYONE
English
0
0
1
90
EZ
EZ@IAMERICAbooted·
Responder :P MITM6 Overprivileged NAA accounts on every machine on the network managed by SCCM. Coerce machine authentications due to webdav and lack of smb signing enforcement. Take control of a machine and dump SAM, SYSTEM, and SECURITY hives. Pass hashes to move laterally. Downgrade machine hashes to NetNLMv1 or NetNTLMv1-SSP and generate the cleartext password. Credentials in local files, scripts, and software. Tokens!! 😈 Tickets!! Authentication Cookies Cached Credentials Certs with client authn Certificate Template and Authority vulns ... still! Write permissions on objects allowing addition of SPN for cracking passwords offline. Kerberoasting Unprotected credentials on shares and in cloud services. Plant malicious files on writable shares to coerce and harvest hashes. Oh wait ... that's pentesters :P
mRr3b00t@UK_Daniel_Card

What's the number one way Ransomware actors get credentials for a network? #Cyber #Security #Ransomware

English
6
2
50
6.6K
Mark Sewell
Mark Sewell@MarkSewe·
@techspence Totally, however inspection is becoming harder and harder with TLS1.3. Also devices are less frequently on corp networks due to hybrid working. Of course you still need to have inspections there too
English
1
0
1
25
spencer
spencer@techspence·
@MarkSewe The times I’ve seen it in place, I have no info about how it was configured. I will say, it’s extremely important to have non-endpoint detections Identity, network & deception
English
1
0
0
132
spencer
spencer@techspence·
I’ve had multiple internal pentests this year where the first security tool to detect my activity was an NDR product. I also had a convo just last week with a company that had ransomware and the first product to detect it (& subsequently block further spread) was their NDR. They have what I’d consider a top 3 EDR product with their “full package.” Is 2026 the year of NDR?
English
26
13
145
27.3K
Mark Sewell
Mark Sewell@MarkSewe·
@NathanMcNulty I’d like Authenticator to support backup to od4b or intune to be able to allow only Authenticator access to iCloud
English
0
0
0
103