Andy

36 posts

Andy

Andy

@andy_waugh

London Katılım Mayıs 2009
118 Takip Edilen86 Takipçiler
Andy retweetledi
Luke Jennings
Luke Jennings@jukelennings·
I’ve just released some research into 38 SaaS-native attack techniques across the kill chain and produced a SaaS attack matrix to go along with it. github.com/pushsecurity/s… This is just the beginning but my hope is this will become an ongoing community project.
English
1
40
78
12.2K
Andy retweetledi
Jon Sakoda
Jon Sakoda@jonsakoda·
Excited to share our investment in @PushSecurity - a new company that uses AI to help users protect themselves while using SaaS apps. Push gives security teams peace of mind and empowers every user to be a defensive force in the fight against cybercrime: decibel.vc/content/push-s…
English
1
7
10
0
Andy retweetledi
Push
Push@PushSecurity·
Thx to @techcrunch for covering our seed funding! "Push is designed to support SaaS usage, & make it more secure. '...by working directly w/employees, we can build mutual trust over time and let them use the tools they want without raising alarm bells.'" buff.ly/3cpy7QG
Push tweet media
English
1
5
15
0
Andy retweetledi
Push
Push@PushSecurity·
Product release! You can now use the Push platform to discover SaaS used in your organization, secure the accounts used on those SaaS platforms, find risky third-party integrations, and use ChatOps to solve problems at scale. buff.ly/3RNq1lo #SaaSsecurity #cloudsecurity
Push tweet media
English
1
6
6
0
Andy retweetledi
Interrupt Labs
Interrupt Labs@InterruptLabs·
Looking for a new role or career change in 2022? 🎆 We're always looking for skilled or developing vulnerability researchers to join our team! 👩‍💻👨‍💻 interruptlabs.co.uk/careers/
English
0
2
4
0
Andy
Andy@andy_waugh·
@MsftSecIntel What kind of impact has publisher verification had on consent phishing? It would be interesting to see stats on how many come from verified publishers today (i.e. accounts in those tenants get compromised) vs. attackers targeting tenants with weak settings for users.
English
0
0
0
0
Microsoft Threat Intelligence
Microsoft Threat Intelligence@MsftSecIntel·
Microsoft Defender for Office 365 protects against consent phishing emails using advanced filtering backed by machine learning, IP and URL reputation systems, and experts constantly monitoring the threat landscape, including the use of OAuth 2.0 URLs: docs.microsoft.com/en-us/microsof…
English
2
2
5
0
Microsoft Threat Intelligence
Microsoft Threat Intelligence@MsftSecIntel·
Consent phishing attacks, which aim to trick users into granting malicious cloud apps access to sensitive data, are steadily increasing. Microsoft provides comprehensive protection against these attacks by coordinating defense across multiple solutions. microsoft.com/security/blog/…
English
1
30
56
0
Andy retweetledi
Push
Push@PushSecurity·
In his latest blog Alex Triaca says: "And just like that you’ve been consent phished. You’ve just granted the attackers permanent access to your account, which they retain even if you change your password or have MFA enabled." bit.ly/3eDLY4u
Push tweet media
English
0
14
71
0
Andy retweetledi
Jacques Louw
Jacques Louw@jacques_sec·
I started reviewing OAuth tokens for users in Google Workspace, It turned out to be non-trivial. I wrote a blog post about it, hopefully it saves someone some time! pushsecurity.com/s?c=oauth-toke…
English
1
7
6
0
Andy retweetledi
Push
Push@PushSecurity·
'Malicious mail rules' are a popular attack technique used to backdoor a user's inbox after a successful account compromise. Check our free tool that can knock this control off your to-do list in under two minutes! bit.ly/2TXy2La #emailsecurity #Office365 #gsuite
English
0
6
8
0
Andy
Andy@andy_waugh·
Really clear breakdown of what’s included in each M365 license 👌 m365maps.com @AaronDinnage - thanks! This is super useful.
English
0
0
0
0
Andy
Andy@andy_waugh·
Anyone aware of any instances of consent phishing for Slack? Or anything other than 365? Send me some links if so pls!
English
0
0
0
0
Andy retweetledi
Microsoft Threat Intelligence
Microsoft Threat Intelligence@MsftSecIntel·
New blog: Attackers used a large cloud-based infrastructure to compromise mailboxes via phishing then add forwarding rules that allowed them to get access to emails. Learn how cross-domain threat data led to the discovery & disruption of this BEC campaign. msft.it/6015nERcZ
English
6
233
496
0
Andy
Andy@andy_waugh·
Note to self: search for less profitable keywords
Andy tweet media
English
0
0
0
0
Andy
Andy@andy_waugh·
Came across "security conversations" podcast yday by @ryanaraine . Listened to a few now, fits the bill nicely, some really interesting episodes - would recommend!
English
0
0
0
0
Andy
Andy@andy_waugh·
Can anyone recommend security podcasts that are NOT news-based? Seems to be plenty of "this week in cyber" but I'd like to hear something different. Like, war stories or "here's how we tried to fix this problem and what we learned along the way" from a sec team etc.
English
3
0
1
0
Andy
Andy@andy_waugh·
@paulg I don't know man...seems like pretty important information to me.
English
0
0
1
0
Paul Graham
Paul Graham@paulg·
"It's pronounced like 'war'." — Useless advice from an English friend on the pronunciation of "Waugh"
English
30
11
347
0
Andy
Andy@andy_waugh·
@publidave @dayzerosec Thanks I'll check it out! And definitely let me know if you do start something, sounds exactly like what I'm interested in 👌
English
0
0
1
0