Abbas Kudrati

2.7K posts

Abbas Kudrati banner
Abbas Kudrati

Abbas Kudrati

@askudrati

Cyber exec @Silverfort | Ex-MSFT | Author of 5+ books | Prof @LaTrobe | Zero Trust believer | GRC whisperer | Identity is the new perimeter | Rider of a BMW R18

Melbourne (VIC) Australia Katılım Ocak 2010
322 Takip Edilen746 Takipçiler
Abbas Kudrati retweetledi
Hassan
Hassan@Heyhassan·
These movies are not answers. They’re mirrors, maps, and warnings. Follow @BoldExaltus for more on discipline, philosophy, psychology, and self-mastery.
English
18
32
347
253K
Abbas Kudrati retweetledi
Hassan
Hassan@Heyhassan·
Dear Daughter, Watch these 12 movies before it’s late: 👇
Hassan tweet media
English
32
467
2.7K
875.8K
Abbas Kudrati retweetledi
Mark Simos
Mark Simos@MarkSimos·
How can CISOs move from "Chief Incident Scapegoat Officer" to "key business partner who keeps me out of jail and keeps our assets safe"? How to become a trusted advisor instead of being sent to the kids table & ignored while waiting to be blamed/fired at the next incident? a 🧵
Mark Simos tweet media
English
1
1
9
500
Abbas Kudrati retweetledi
Hassan
Hassan@Heyhassan·
Dear Son, Watch these 12 movies before it’s late: 👇
Hassan tweet media
English
964
12.4K
93.7K
18.7M
Abbas Kudrati retweetledi
Microsoft Alumni
Microsoft Alumni@microsoftalumni·
Generative AI is transforming cybersecurity, making it crucial to master defense tactics and responsible AI use. Join cybersecurity expert and #MSFTAlum @askudrati at 2 p,m. PDT on June 12 for “Understanding Threats and Opportunities of GenAI." microsoftalumni.com/s/1769/19/inte…
Microsoft Alumni tweet media
English
0
1
2
123
Abbas Kudrati retweetledi
🧬Craig Brockie
🧬Craig Brockie@CraigBrockie·
You’ve been lied to about weight loss. Cardio is a stupid way to lose fat. It barely burns any calories, makes you hungrier, and leads to overeating. Let me share a science-backed system to drop 20 pounds of fat before summer (without ever stepping on a treadmill): 🧵
🧬Craig Brockie tweet media
English
143
548
3K
1.7M
Abbas Kudrati retweetledi
🧬Craig Brockie
🧬Craig Brockie@CraigBrockie·
Thanks for reading! If you found this thread useful, give it a retweet to help others with their weight loss journey. And follow me @craigbrockie for science-based insights to improve your health and longevity.
🧬Craig Brockie@CraigBrockie

You’ve been lied to about weight loss. Cardio is a stupid way to lose fat. It barely burns any calories, makes you hungrier, and leads to overeating. Let me share a science-backed system to drop 20 pounds of fat before summer (without ever stepping on a treadmill): 🧵

English
2
11
53
37.9K
Abbas Kudrati retweetledi
Mark Simos
Mark Simos@MarkSimos·
I just published an article describing all the roles with security responsibilities and/or accountabilities across business, technology, &security teams. Also discusses how important it is to start accountability correctly at the top of the organization. linkedin.com/pulse/security…
Mark Simos tweet media
English
1
17
72
4.4K
Abbas Kudrati retweetledi
Vivek Ramachandran
Vivek Ramachandran@vivekramac·
Midnight Blizzard is conducting large-scale spear-phishing campaign using RDP files! In this campaign, the malicious .RDP attachment was configured with sensitive settings designed to enable significant information exposure. Once the target system was compromised, it established a connection with a server controlled by the threat actor. This connection facilitated bidirectional mapping of the targeted user's local device resources to the malicious server. Resources shared with the server included, but were not limited to, logical hard drives, clipboard data, printers, connected peripheral devices, audio streams, and authentication features of the Windows operating system, such as smart cards. This access allowed the threat actor to install malware on the local drives and mapped network shares of the victim, particularly in AutoStart folders, to achieve persistence. Additionally, they could deploy tools like remote access trojans (RATs) to retain control even after the RDP session ended. Furthermore, the process of establishing an RDP connection with the malicious server could expose the credentials of the user currently logged into the compromised system. Unfortunately, EDR/XDRs are rendered useless as they can either block ALL or NO .rdp files - there is no way to make an EDR inspect the RDP file for malicious settings or unauthorized servers. This is where SquareX can help and block this - our browser-native content inspection can automatically parse RDP files and scan for malicious intent and unauthorized servers. In this video, we simulate this attack and show how. We do all of this by deploying just a simple Browser Extension which works on ANY browser! If you are interested in knowing more: sqrx.com @getsquarex Original Microsoft Article: lnkd.in/gHSpeidb
English
0
5
12
786
Abbas Kudrati retweetledi
SquareX
SquareX@getsquarex·
What a fantastic start to our time in Melbourne! Team SquareX had the honor of hosting a CISO Luncheon, bringing together 20+ #cybersecurity leaders for an engaging discussion. A big thank you to our advisor, @askudrati, for delivering a powerful opening keynote.
SquareX tweet mediaSquareX tweet mediaSquareX tweet media
English
1
1
1
100
Abbas Kudrati retweetledi
Vincent Flibustier 👽
Vincent Flibustier 👽@vinceflibustier·
🔥 How I broke the internet today and what lessons can we learn from it? #Crowdstrike 🧐 Several things that make it a good fake that worked: 👇 1. No culprit named yet, I bring it on a platter, people like to have a culprit. 2- The culprit seems completely stupid, he is proud of his stupidity, he... takes his afternoon off on... the first day of work... 3- This falls right into a huge buzz in which people absolutely need to have new information, and a fake is by nature new, you won't read it anywhere else 4- In English = very easy to share internationally, with the vast majority of people who have no idea who I am. 5- Baby fingers are stupid, but they distract people from other things (like the fact that I have a horn on my head because of bad clipping) 6- Confirmation bias: People want to believe it, it's so funny. “I like the information, so it is true.” 7- The information is pushed ironically by people who know that it is a joke, and then it arrives in the litteral zone which amplifies it even stronger.
English
203
1.2K
5.9K
2.6M
Abbas Kudrati retweetledi
Microsoft 365 Status
Microsoft 365 Status@MSFT365Status·
We're aware of an issue with Windows 365 Cloud PCs caused by a recent update to CrowdStrike Falcon Sensor software. This is being communicated under WP821561 in the admin center. (Cont...)
English
45
646
1.8K
432.4K