Daaf.nl ⚓️

2.8K posts

Daaf.nl ⚓️

Daaf.nl ⚓️

@daafnl

Den Haag Katılım Temmuz 2010
608 Takip Edilen91 Takipçiler
Daaf.nl ⚓️ retweetledi
Tom Jøran Sønstebyseter Rønning
Microsoft Edge loads all your saved passwords into memory in cleartext — even when you’re not using them.
English
96
348
2.9K
271.4K
Daaf.nl ⚓️ retweetledi
Ridgeline Cyber
Ridgeline Cyber@RidgelineCyber·
A user reports a suspicious email. Your SOC resets the password and revokes the session. Ticket closed. The attacker re-authenticates the next morning using the MFA method they registered during the 30 minutes they had access. This is the most common failure pattern in M365 identity compromise response. Teams jump to containment before they've enumerated persistence. A password reset removes the original access method while leaving everything the attacker built during their session — new MFA methods, OAuth applications, registered devices, and mailbox forwarding rules. Every one of those survives a password reset. Everyone survives a session revocation. We wrote a step-by-step investigation sequence for M365 identity compromise that most SOC playbooks get wrong: Step 1: Identify the compromise sign-in — how they got in and why your controls allowed it Step 2: Map post-compromise activity — what they did with the access Step 3: Enumerate every persistence mechanism — MFA, OAuth, devices, mailbox rules Step 4: Contain in the right order — revoke persistence BEFORE resetting the password The post includes the KQL queries for each step, a persistence comparison table showing what survives password resets, and a baseline query you should run on your tenant right now — before the next alert fires.
Ridgeline Cyber tweet media
English
2
16
69
4.8K
Daaf.nl ⚓️ retweetledi
Horizon Secured
Horizon Secured@horizon_secured·
🔒 Secure Bits 💡 𝗕𝗿𝗲𝗮𝗸-𝗴𝗹𝗮𝘀𝘀 𝗮𝗰𝗰𝗼𝘂𝗻𝘁𝘀: 𝗳𝘂𝗹𝗹 𝗴𝘂𝗶𝗱𝗲 (𝗣𝗗𝗙) In my last post I talked about the “worst day” scenario: CA misconfig → admins locked out. Most orgs think they’re covered… until they test it. As promised, 𝗵𝗲𝗿𝗲’𝘀 𝘁𝗵𝗲 𝗳𝘂𝗹𝗹 𝗣𝗗𝗙 𝗴𝘂𝗶𝗱𝗲 that walks you through a practical break-glass setup: ▪️ Naming ▪️ Permissions ▪️ Role-Assignable Security Group ▪️ Custom Break-glass Administrator role (Optional) ▪️ Restricted Management Administrative Unit (RMAU) ▪️ Authentication Methods ▪️ Conditional Access Configuration ▪️ Monitoring & Alerting ▪️ Operational Procedures 📎 Download the PDF here: academy.horizon-secured.com/p/m365-securit… 𝘈𝘶𝘵𝘩𝘰𝘳: Martin Strnad 💬 When was the last time you tested your break-glass access? #EntraID #IdentitySecurity #ConditionalAccess #SecureBits #HorizonSecured
Horizon Secured tweet mediaHorizon Secured tweet mediaHorizon Secured tweet mediaHorizon Secured tweet media
English
1
12
71
4.3K
Daaf.nl ⚓️ retweetledi
Sukh Sroay
Sukh Sroay@sukh_saroy·
Plug a $30 USB stick into your laptop and you can listen to satellites, decode pager traffic, intercept walkie-talkies, and watch TV signals fall out of the air around you. Free. No license. No subscription. Just one tool nobody outside the radio underground talks about. It's called SigDigger. An open source digital signal analyzer that turns a cheap SDR dongle into a full radio intelligence rig. Here is what it can actually do. Point it at the sky and you can pull down NOAA weather satellite images as they pass overhead. Tune it to your local airport and you can decode aircraft transponders in real time. Sweep the FM band and you can demodulate analog voice the moment it hits the antenna. The interface looks like a Bloomberg Terminal for the airwaves. A live waterfall display showing every signal in your area. PSK, FSK, and ASK demodulation. Burst signal analysis for the weird short transmissions nobody can identify. Analog video decoding. Panoramic spectrum sweeping across entire frequency ranges. All running on a Linux or macOS laptop with zero specialized hardware. What used to require a $40,000 spectrum analyzer locked inside a defense lab now runs in your living room for the price of a USB stick. The author built the entire DSP backend from scratch instead of leaning on GNU Radio. He wrote his own core library called Suscan, his own signal processing library called Sigutils, and his own widget library called SuWidgets. Faster. Cleaner. Optimized for the exact tasks reverse engineers and amateur radio operators actually need. Plugin support is built in. AmateurDSN for deep space network monitoring. APTPlugin for weather satellites. AntSDRPlugin for the AntSDR hardware. ZeroMQPlugin for piping signal data into other tools. Everything snaps in with one command. The whole stack supports SoapySDR, which means almost every SDR device on the market works out of the box. RTL-SDR. HackRF. LimeSDR. Airspy. Plug it in and start digging. 1.5K stars. LGPL-3.0. 100% Opensource.
Sukh Sroay tweet media
English
26
280
1.7K
76.9K
Daaf.nl ⚓️ retweetledi
spencer
spencer@techspence·
Service accounts are prime targets for attackers. Some advice on protecting them… 1. Use Managed Service Accounts - this is as close to an easy button as you can get 2. Rotate passwords strategically - what I mean here is, if you don’t need to rotate the password, don’t. Unless you suspect compromise or the password has been leaked or used elsewhere. 3. Monitor for abnormalities - Monitor for suspicious logins like when the account authenticates outside of typical time windows or when it’s used on hosts it doesn’t typically login to. One last bonus tip is to document where your service accounts are being used and its purpose. One of the worst issues I’ve seen is when a service account password is updated and one location the account is used gets missed, brining production systems or applications down. That’s no fun (:
English
9
19
127
7.5K
Daaf.nl ⚓️ retweetledi
Patch My PC
Patch My PC@PatchMyPC·
Tomorrow's the day! 👀 Secure Boot cert changes are coming, and most environments aren’t as covered as they think. No alerts. No failures. Just hidden gaps. If you can’t prove you’re covered, that’s your signal. Join us 👉 bit.ly/4sHDU6y #MSIntune #ConfigMgr #EndpointManagement
English
1
4
13
800
Daaf.nl ⚓️ retweetledi
Ihtesham Ali
Ihtesham Ali@ihtesham2005·
The New York Times charges $17/month. The Wall Street Journal charges $38/month. Nature charges $199/year. Someone just open sourced a proxy that bypasses all of them for $0. And publishers cannot shut it down. It's called Ladder. Here's the trick that makes it work: Every news site and academic journal on earth shows Google the full article text for free. They have no choice. Block Googlebot and you disappear from search results overnight. Ladder pretends to be Googlebot. Same headers. Same fingerprint. Same access Google gets. → Paste any paywalled URL → Full article loads instantly → No account. No subscription. No credit card. → Works on NYT, WSJ, Bloomberg, Nature, Science, The Lancet, The Atlantic, and hundreds more → Also strips CORS headers from any URL, which saves developers a stupid amount of time Publishers got 12ft killed by pressuring the domain registrar. Ladder runs on your own server. There's no domain to seize. No company to pressure. No central server to shut down. One Docker command. Your machine. Your rules. 6.3K stars. MIT License. 100% Opensource - github.com/everywall/ladd…
Ihtesham Ali tweet media
English
115
666
5.7K
469.1K
Daaf.nl ⚓️ retweetledi
Microsoft Mechanics
Microsoft Mechanics@MSFTMechanics·
Copilot, Agent 365, Entra Suite, and E5 security unified in one subscription. Watch deep dives into how each E7 component works in our playlist: youtube.com/playlist?list=…
English
0
4
13
1.8K
Daaf.nl ⚓️ retweetledi
Haakon Wibe
Haakon Wibe@HaakonWibe·
Every Intune admin has lost an afternoon to an M365 Apps + Visio + Project + language pack deployment that "almost" worked. Got tired of that, built a toolkit so my team doesn't have to. Three commands to get going, four products covered, 113 language packs for those counting, install/uninstall whatever order you like. github.com/haakonwibe/m36…
Haakon Wibe tweet media
English
2
13
94
5.7K
Daaf.nl ⚓️ retweetledi
vxdb
vxdb@vxdb·
If you wanna stay on top of cybersecurity news, you need these sites in your RSS reader BleepingComputer DarkReading RecordedFuture - The Record SecurityWeek DataBreachedNet TheRegister HackerNews (hit or miss) KrebsOnSecurity 404Media ArsTechnica TechDirt
English
30
216
1.9K
62K
Daaf.nl ⚓️ retweetledi
Unit 42
Unit 42@Unit42_Intel·
V2 of the #Kali365 PhaaS toolkit has emerged with dedicated OAuth and AI-based lure generation, seeing widespread abuse. This kit is distributed via Telegram and has features like a domain marketplace, Cloudflare worker hosting and keyword searching: bit.ly/3QupSXM
Unit 42 tweet mediaUnit 42 tweet mediaUnit 42 tweet media
English
4
35
154
15.7K
Daaf.nl ⚓️ retweetledi
Dark Web Informer
Dark Web Informer@DarkWebInformer·
‼️ CVE-2026-32223: Windows USB Printing Stack (usbprint.sys) Elevation of Privilege Vulnerability
English
3
72
313
31.5K
Daaf.nl ⚓️ retweetledi
Fabian Bader
Fabian Bader@fabian_bader·
Suspicious MFA authentication approval was added to Entra ID risk protections. Limited to P2 customers 😢
Fabian Bader tweet media
English
13
38
240
18.2K
Daaf.nl ⚓️ retweetledi
Ridgeline Cyber
Ridgeline Cyber@RidgelineCyber·
OAuth consent phishing is the #M365 attack most orgs still aren’t watching. No password stolen. No MFA bypassed. Just one “Sign in with Microsoft → Approve” click. Malicious app gets a refresh token with persistent access to mail, files & calendar. Bypasses Conditional Access. Logs look normal. Default detections miss it. Fix: Monitor Entra audit logs for “Consent to application”. Alert on risky scopes (Mail.Read, Files.ReadWrite.All, offline_access) from unverified publishers. Better: Disable user consent entirely. Force admin approval only, where practical. This is the gap between “we have MFA” and real security. M365/SecOps pros: auditing your consents right now!
Ridgeline Cyber tweet media
English
4
27
113
8.6K