Jeremy Tinder

127 posts

Jeremy Tinder banner
Jeremy Tinder

Jeremy Tinder

@tinderj_

Leader, Father, Learner, and Responder in the Microsoft Security Response Center

Redmond, WA Katılım Kasım 2012
221 Takip Edilen144 Takipçiler
Jeremy Tinder retweetledi
Microsoft Security Response Center
Microsoft Security Response Center@msftsecresponse·
We’re excited to announce the scope of the Microsoft AI Bounty Program has expanded to include new vulnerability types for Critical and Important cases, with awards up to $30,000. New vulnerability types: - Deserialization of Untrusted Data - Injection (Code Injection) - Authentication Issues - Injection (SQL Injection and Command Injection) - Server-Side Request Forgery (SSRF) - Improper Access Control - Cross Site Scripting (XSS) - Cross-Site Request Forgery (CSRF) - Web Security Misconfiguration - Cross Origin Access Issues - Improper Input Validation Learn more on the AI Bounty Program page: microsoft.com/en-us/msrc/bou…
English
4
20
56
10K
Jeremy Tinder retweetledi
Microsoft Security Response Center
Microsoft Security Response Center@msftsecresponse·
Congratulations to all the researchers recognized in this quarter’s MSRC 2024 Q4 Security Researcher Leaderboard! 🎉Thanks to all the researchers who partnered with us for your hard work and continued dedication to securing our customers. Learn more in our blog post: msrc.microsoft.com/blog/2025/01/c… We also want to recognize the top 10 researchers in the leaderboard: 🥇Suresh Chelladurai 🥈VictorV @vv474172261 🥉wkai Anonymous Dhiral Patel @dhiralpatel94 200D8A8F3C82E9097370B6831725C80B Alireza Amirheidari Adnan Unpatched.ai ycdxsb #cybersecurity #securityresearch #bugbounty
Microsoft Security Response Center tweet media
English
4
10
39
9.9K
Jeremy Tinder retweetledi
Microsoft Security Response Center
Microsoft Security Response Center@msftsecresponse·
Join MSRC and special guest Scott Gorlick, Principal Security Architect at Microsoft, next week for a virtual session on Security Research in Copilot Studio. The Copilot ecosystem allows enterprises to develop Copilot Agents using resources and integrations that span services in Microsoft and systems owned by the customer outside the Microsoft ecosystem. Demonstrating the architecture, governance controls, and other service capabilities will help focus security research and increase the fidelity of vulnerability reports. 🗓️ Date: Wednesday, January 22nd 🕙 Time: 10 – 11 AM PST Register now: microsoft.eventsair.com/security-resea…
Microsoft Security Response Center tweet media
English
3
20
27
16K
Jeremy Tinder retweetledi
Microsoft Security Response Center
Microsoft Security Response Center@msftsecresponse·
As part of our Secure Future Initiative and to further the security of our customers, ourselves, and the world, today we are introducing the most transparent security research event in history: The Zero Day Quest. This new hacking event will be the largest of its kind, with an additional $4 million in potential awards for research into high-impact areas, specifically cloud and AI. Starting today, the quest kicks off with a research challenge where vulnerability submissions in targeted scenarios are eligible for multiplied bounty awards. Submissions can also qualify researchers for a spot in the onsite hacking event in Redmond, WA, in 2025. Learn more in our blog post:  msrc.microsoft.com/blog/2024/11/s… #ZeroDayQuest
Microsoft Security Response Center tweet media
English
6
59
134
64.5K
Jeremy Tinder retweetledi
Microsoft BlueHat
Microsoft BlueHat@MSFTBlueHat·
We’re excited to introduce our #BlueHat lightning session speakers! Ayobami Olatunji (@ayam_mayowa) from Microsoft will present “SafeChatAI: Enhancing Cybersecurity Awareness Using Artificial Intelligence.” Ayobami is a Security PM in Isolation Platform at Microsoft. He’s focusing on ensuring users security assurance on Windows platform and leveraging various technologies like AI/ML to stay ahead of cyber threats. Ayobami is also an enthusiastic community builder, always eager to learn and share knowledge. He’s helped establish IT/Security clubs at both the University of Ilorin and Western Illinois University, creating spaces for students to grow and explore the world of technology together. Susan Krkasharian from Microsoft will present “A Security Engineer’s Journey: Creating a Developer-Friendly Security.” Susan started at Microsoft as an intern and moved to a full-time role after earning her Computer Science degree from UCLA. She has been with the DevSec team for over four years, during which she also completed her MBA at the University of Southern California. During her time at Microsoft as a security software engineer, Susan has developed effective strategies for preventing, detecting, and mitigating SSRF vulnerabilities. Zachary Steindler from Microsoft will present “Lessons Learned: Scaling Out Securing Open Source.” Zach is the chair of the OpenSSF's Technical Advisory Council and co-chair of the Securing Repositories Working Group which helps coordinate security improvements in programming language package repositories like PyPI and Ruby Gems. In early 2024 he co-published "Principles for Package Repository Security" with US CISA. He works at GitHub on securing software development for open source and enterprises. Yves Younan from Cisco Talos will present “Entitlements on macOS and why they matter.” Yves leads the Vulnerability Discovery & Research team within the Talos Security Intelligence and Research Group at Cisco. Prior to joining Sourcefire's Vulnerability Research Team, he worked as a Security Researcher with BlackBerry Security. Before joining BlackBerry, he was an academic, founding the Native Code Security group within the DistriNet research group at the Katholieke Universiteit Leuven in Belgium. He received a Master in Computer Science from the Vrije Universiteit Brussel and a PhD in Computer Science from the Katholieke Universiteit Leuven. His PhD focussed on mitigations against memory corruption vulnerabilities.
Microsoft BlueHat tweet mediaMicrosoft BlueHat tweet mediaMicrosoft BlueHat tweet mediaMicrosoft BlueHat tweet media
English
2
6
15
9.6K
Jeremy Tinder retweetledi
Microsoft BlueHat
Microsoft BlueHat@MSFTBlueHat·
This evening, we kicked off BlueHat with a welcome reception, bringing together our speakers, MSRC MVRs, Microsoft leadership, and the MSRC team. A huge thank you to everyone who joined us and contributed to setting the stage for a successful #BlueHat!
Microsoft BlueHat tweet mediaMicrosoft BlueHat tweet mediaMicrosoft BlueHat tweet mediaMicrosoft BlueHat tweet media
English
1
6
39
5.5K
Jeremy Tinder retweetledi
Microsoft Security Response Center
Microsoft Security Response Center@msftsecresponse·
Microsoft was proud to sponsor the Cybersecurity Woman of the Year Awards 2024. Congratulations to all the winners and nominees, including Eva Benn, Senior Security Program Manager on the Microsoft Red Team, who was a finalist for the “People’s Choice” Award. The CSWY Awards celebrate outstanding female cybersecurity professionals making a significant impact through their dedication and expertise. Additionally, Sherrod DeGrippo @sherrod_im, Director of Threat Intelligence Strategy at Microsoft @msftsecintel, shared career guidance during her keynote: “Knowing what you want is key to getting what you want. Everything you want is yours to take.” She also revealed her mantra for overcoming challenging career situations, especially when facing fears like speaking on stage in front of thousands: “Do it scared, but do it.” @KarmenINTL #CSWY2024
Microsoft Security Response Center tweet mediaMicrosoft Security Response Center tweet media
English
0
3
24
4.5K
Jeremy Tinder retweetledi
Microsoft Security Response Center
Microsoft Security Response Center@msftsecresponse·
The Microsoft Researcher Recognition Program offers public thanks and recognition to security researchers who help protect our customers by discovering and sharing security vulnerabilities under Coordinated Vulnerability Disclosure. Today, we are excited to recognize this year’s 100 Most Valuable Researchers (MVRs), based on the total number of points earned for each valid report. Please join us in celebrating this year’s MVRs, including our top 10: 1. 🥇 Yuki Chen @guhe120 2. 🥈Wei @XiaoWei___ 3. 🥉VictorV @vv474172261 4. Suresh Chelladurai 5. Dhiral Patel @dhiralpatel94 6. Erik Donker @kire_devs_hacks 7. Nutesh Surana @_niteshsurana working with Trend Micro Zero Day Initiative @thezdi 8. Anonymous 9. Tzah Pahima @TzahPahima 10. wkai See the full list of this year’s 100 MVRs, in addition to our Azure, Office, Windows, and Dynamics 365 leaderboards: msrc.microsoft.com/blog/2024/08/c… #bugbounty #infosec
Microsoft Security Response Center tweet media
English
3
23
90
120.9K
Cristin Flynn Goodwin
Cristin Flynn Goodwin@CristinGoodwin·
Someone in the family has hacked our soccer team chat app and changed my screen name but I’m not sure who is guilty. Opening SSIRP bridge now, investigation underway.
Cristin Flynn Goodwin tweet media
English
7
0
52
0
Jeremy Tinder
Jeremy Tinder@tinderj_·
What good is @dish if I don’t have NBC and Sunday night football? First Fox, now NBC? I’m seriously reconsidering my service now.
English
1
0
1
0