spencer

49.3K posts

spencer banner
spencer

spencer

@techspence

🛠️ Former Sysadmin, now Pentester | Microsoft MVP | Helping IT teams make their environment harder to attack | @SecurIT360 & @CyberThreatPOV

🏰AD Security Resource Kit ⬇️ เข้าร่วม Kasım 2010
2.8K กำลังติดตาม15.5K ผู้ติดตาม
ทวีตที่ปักหมุด
spencer
spencer@techspence·
If you’ve spent any amount of time in cybersecurity you know that blindly following “industry standards” can sometimes do more harm than good. For example, disabling legacy network protocols is great, until it impacts your manufacturing devices. In this guest blog post I elaborate on this and I share some common pitfalls when designing and implementing security policies. At the end I share some advice for designing policies that work in reality. Ps - Big thanks to @ninjaone for allowing me to share a blog on their website! 🙏 Read here: see.ninjaone.com/umroX
spencer tweet media
English
6
10
77
10.6K
Dave McCollough
Dave McCollough@davemccollough·
Started documenting my PenTest+ journey on GitHub. Adding new notes and technical refs as I go. Feel free to follow along if you're studying for this cert. github.com/dave-mccolloug…
English
1
0
1
79
spencer รีทวีตแล้ว
WhiskeyHacker
WhiskeyHacker@whiskeyhacker·
CISA published an advisory on endpoint hardening after Stryker. The RBAC guidance is solid. Multi Admin Approval for Intune is not a complete solution either. An attacker with Global Admin can create the second approver account themselves. That is a five minute delay, not a defense. What actually stops this: no standing GA roles, PIM with fresh FIDO2 at activation, and a session revocation circuit breaker that fires the moment bulk wipes start. We have been on Handala/Stryker since March 12. Here is what CISA got right and what they missed. threathunter.ai/blog/cisa-got-… #Stryker #Handala #CISAAlert #IdentitySecurity #MDR
English
3
21
98
4.5K
Mike Manrod
Mike Manrod@CroodSolutions·
These temperatures do not belong in March.
Mike Manrod tweet media
English
4
0
5
120
spencer
spencer@techspence·
@IceSolst It seems like (anecdotally) that there’s actually a non-small number of folks adopting MCP and moving forward with it, building products and services around it even. At what point is it what we get vs fighting for something else?
English
0
0
2
57
solst/ICE of Astarte
The frustration with MCP is imo an issue in itself. You don’t want to adopt a system that just pisses people off and frustrates your devs, just because a minority are pushing for it. Th sentiment around MCP is generally negative, for good reasons (see great video below).
Zack Korman@ZackKorman

I got mad about people defending MCP so I made this video. The first minute is just me being very mad, but then I tried to contribute something of value after that. youtube.com/watch?v=m0VyZU…

English
8
1
49
2.5K
spencer
spencer@techspence·
@KATLGable Stocking up on hot sauce now I guess
GIF
English
0
0
1
8
spencer
spencer@techspence·
Two things (out of many) that I love: Cybersecurity Comedy 👋 if that’s you too…
English
4
0
18
641
spencer
spencer@techspence·
What’s on everyone’s bingo card as being the next big zero day?
English
27
2
15
3.4K
Tanner
Tanner@wbmmfq·
A fun new-ish #Clickfix payload has been using Node.js to deploy a local SOCKS proxy, then connecting to Tor over that to download a secondary payload. Maybe I'll do a bit more of a writeup of it later. We'll see how the day goes.
English
4
4
38
2.4K
spencer รีทวีตแล้ว
MagicSword
MagicSword@magicswordio·
Default rules don’t stop modern attacks. We integrate live intelligence - LoLBins, vulnerable drivers, abused certificates - directly into application control policies. So when you move from “Audit” to “Enforce,” you’re not guessing. You’re enforcing against tools that have already been weaponized in real-world breaches, not hypothetical risks, not generic blocklists, but proven abuse patterns. Move from audit mode to real enforcement. Start your MagicSword trial: magicsword.io/plan
English
0
1
5
466
spencer รีทวีตแล้ว
RussianPanda 🐼 🇺🇦
RussianPanda 🐼 🇺🇦@RussianPanda9xx·
🚨 NEW VIDEO DROP FROM PANDA 🐼 I got a full walkthrough of @ThruntingLabs from @Kostastsale and this platform is different - no simulations. You are investigating REAL intrusions with REAL telemetry - query actual EDR logs in Elastic, Splunk, or Azure Log Analytics. If you're in blue team / SOC / IR or aspiring to be - I highly recommend checking it out 🔗 youtube.com/watch?v=YC-E5D…
YouTube video
YouTube
English
4
20
112
11.5K
Andrew Thompson
Andrew Thompson@ImposeCost·
Need new shirt. Impose HEAVY Costs. 😅
English
1
0
19
462
Andrew Thompson
Andrew Thompson@ImposeCost·
“We have to impose heavy costs. We need to do it more often, and we need to do it in a more routine and coordinated fashion,” Lind said. He added that those responses will not necessarily mirror the attacks themselves: “We don’t have to cyber them because they’ve cybered us.” 🔥
The Record From Recorded Future News@TheRecord_Media

The Trump administration is not considering allowing private companies to carry out cyberattacks on behalf of the government, White House officials said this week, pushing back on speculation about the role of industry in U.S. cyber operations therecord.media/offensive-cybe…

English
4
1
20
2.2K
Jason Lang
Jason Lang@curi0usJack·
It's over.
Jason Lang tweet media
English
4
1
18
1.3K
spencer
spencer@techspence·
@CDyac9 I remember playing with ms17-010 on my lab. It crashed a DC I tested it on and I thought it was amazing lol
English
0
0
1
5
CDROM
CDROM@CDyac9·
@techspence LOL… I don’t want anything to burn down, but I did enjoy MS08-067 and MS17-010 :)
English
1
0
1
7
spencer
spencer@techspence·
@EvanKlein338226 Yeah this is not an uncommon phenomena. That’s why I say 99% of vulns don’t matter. Most you can safely auto patch, then use your precious time on the 1%
English
0
0
0
15
Evan Klein
Evan Klein@EvanKlein338226·
Real talk. Had a client last week bragging about their AI scan finding 200+ "vulns" - 80% were informational findings they'd never fix, 15% were false positives, and maybe 5% were actually exploitable. Finding vulns ≠ fixing vulns ≠ reducing risk. The remediation gap is where security actually happens.
English
1
0
1
16
spencer
spencer@techspence·
Sorry folks but, "we found 137 vulnerabilities we never knew were there thanks to AI" doesn't mean you're all of a sudden protected.
English
10
3
41
3.1K
spencer
spencer@techspence·
@CyberSecAJ hmm I have done pentests where the client put me on a printer vlan. Like literally nothing there, segmented off. We put assumptions in the report for this reason, but we also mention it to the client to try and change it
English
0
0
1
9
AJ 🏀
AJ 🏀@CyberSecAJ·
Begs a ethical ish q here you ever done an audit or pentest where you KNOW your being fed doctored data but you cant do or act on it ? I remember in the past before our pentests and audits my manager made me review every starter and leaver from the last 12 months.
English
3
0
1
31
Carmen
Carmen@syntaxish·
@techspence Yeah he won me over with the office memes. He was quite hilarious 😂. Also, yes, you need to be a presenter. I think I hear you mentioned in almost every class.
English
1
0
0
9
Carmen
Carmen@syntaxish·
Tonight’s TISU class was great and even better the presenter’s slides had me dying.
Carmen tweet media
English
2
1
10
329